Sciweavers

544 search results - page 90 / 109
» Governed Content Distribution on DHT Based Networks
Sort
View
WWW
2005
ACM
14 years 8 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
ICASSP
2008
IEEE
14 years 2 months ago
Adaptable K-nearest neighbor for image interpolation
A variant of the k-nearest neighbor algorithm is proposed for image interpolation. Instead of using a static volume or static k, the proposed algorithm determines a dynamic k that...
Kenta S. Ni, Truong Q. Nguyen
SBACPAD
2005
IEEE
177views Hardware» more  SBACPAD 2005»
14 years 1 months ago
Automatic Data-Flow Graph Generation of MPI Programs
The Data-Flow Graph (DFG) of a parallel application is frequently used to take scheduling decisions, based on the information that it models (dependencies among the tasks and volu...
Rafael Ennes Silva, Guilherme P. Pezzi, Nicolas Ma...
DBKDA
2009
IEEE
136views Database» more  DBKDA 2009»
13 years 11 months ago
Visualization and Integration of Databases Using Self-Organizing Map
Abstract--With the growing computer networks, accessible data is becoming increasing distributed. Understanding and integrating remote and unfamiliar data sources are important dat...
Farid Bourennani, Ken Q. Pu, Ying Zhu
INFOCOM
2012
IEEE
11 years 10 months ago
An effective hop-by-hop Interest shaping mechanism for CCN communications
Abstract—We introduce a rate-based congestion control mechanism for Content-Centric Networking (CCN). It builds on the fact that one Interest retrieves at most one Data packet. C...
Natalya Rozhnova, Serge Fdida