Sciweavers

60 search results - page 7 / 12
» Implications of Interdomain Traffic Characteristics on Traff...
Sort
View
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 7 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack
KDD
2006
ACM
185views Data Mining» more  KDD 2006»
14 years 8 months ago
How to Define Searching Sessions on Web Search Engines
We investigate three methods for defining a session on Web search engines. We examine 2,465,145 interactions from 534,507 Web searchers. We compare defining sessions using: 1) Int...
Bernard J. Jansen, Amanda Spink, Vinish Kathuria
SEW
2005
IEEE
14 years 1 months ago
Using Visualization to Understand Dependability: A Tool Support for Requirements Analysis
Dealing with dependability requirements is a complex task for stakeholders and analysts as many different aspects of a system must be taken into account at the same time: services...
Paolo Donzelli, Daniel Hirschbach, Victor R. Basil...
CONEXT
2008
ACM
13 years 9 months ago
Advantages of a PCE-based control plane for LISP
The Locator/Identifier Separation Protocol (LISP) is one of the candidate solutions to address the scalability issues in inter-domain routing. The current proposals for its contro...
Alberto Castro, Martín Germán, Xavie...