Sciweavers

2006 search results - page 319 / 402
» Heuristic Security-Testing Methods
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Hybrid search schemes for unstructured peer-to-peer networks
— We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes comb...
Christos Gkantsidis, Milena Mihail, Amin Saberi
LAWEB
2005
IEEE
14 years 2 months ago
A Latency-Based Object Placement Approach in Content Distribution Networks
Content Distribution Networks (CDNs) are increasingly being used to disseminate data in today's Internet aiming at reducing the load on the origin server and the traffic on t...
George Pallis, Athena Vakali, Konstantinos Stamos,...
MMM
2005
Springer
146views Multimedia» more  MMM 2005»
14 years 2 months ago
Retrieval of News Video Using Video Sequence Matching
In this paper, we propose a new algorithm to find video clips with different temporal durations and some spatial variations. We adopt a longest common subsequence (LCS) matching t...
Young-tae Kim, Tat-Seng Chua
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 2 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...
DEXA
2005
Springer
160views Database» more  DEXA 2005»
14 years 2 months ago
Improved Sequential Pattern Mining Using an Extended Bitmap Representation
The main challenge of mining sequential patterns is the high processing cost of support counting for large amount of candidate patterns. For solving this problem, SPAM algorithm wa...
Chien-Liang Wu, Jia-Ling Koh, Pao-Ying An