Sciweavers

5324 search results - page 945 / 1065
» Internet Security Protocols
Sort
View
LSO
2001
Springer
14 years 9 days ago
Knowledge Elicitation through Web-Based Data Mining Services
Knowledge is a vital component for organisational growth and data mining provides the technological basis for automated knowledge elicitation from data sources. The emergence of Ap...
Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zas...
NOSSDAV
2001
Springer
14 years 9 days ago
A comparison of layering and stream replication video multicast schemes
The heterogeneity of the Internet’s transmission resources and end system capability makes it difficult to agree on acceptable traffic characteristics among the multiple receive...
Taehyun Kim, Mostafa H. Ammar
EUROMICRO
2000
IEEE
14 years 8 days ago
Agent-Based Adaptive Selection and Interaction to Z39.50 Servers
Digital libraries and OPACs are offering an enormous collection of information resources which can be accessed through Internet by quite different users thanks to the existence of...
Camino Fernández, Ignacio Aedo, Paloma D&ia...
ICNP
2000
IEEE
14 years 8 days ago
Generalized Load Sharing for Packet-Switching Networks
—In this paper, we extend the load sharing framework to study how to effectively perform flow-based traffic splitting in multipath communication networks. The generalized load sh...
Ka-Cheong Leung, Victor O. K. Li
ICPADS
2000
IEEE
14 years 8 days ago
Java 2 Distributed Object Models Performance Analysis, Comparison and Optimization
This paper is focused on the performance analysis, comparison and optimization of the most important distributed object models for Java: RMI (Remote Method Invocation) and RMI-IIO...
Matjaz B. Juric, Ivan Rozman, Alan P. Stevens, Mar...