Sciweavers

13966 search results - page 2769 / 2794
» Internet as a
Sort
View
TFS
2008
153views more  TFS 2008»
13 years 6 months ago
Encoding Words Into Interval Type-2 Fuzzy Sets Using an Interval Approach
This paper presents a very practical type-2-fuzzistics methodology for obtaining interval type-2 fuzzy set (IT2 FS) models for words, one that is called an interval approach (IA). ...
Feilong Liu, Jerry M. Mendel
LREC
2010
175views Education» more  LREC 2010»
13 years 6 months ago
Creating a Reusable English-Chinese Parallel Corpus for Bilingual Dictionary Construction
This paper first describes an experiment to construct an English-Chinese parallel corpus, then applying the Uplug word alignment tool on the corpus and finally produce and evaluat...
Hercules Dalianis, Hao-chun Xing, Xin Zhang
NETWORKING
2010
13 years 6 months ago
Speculative Validation of Web Objects for Further Reducing the User-Perceived Latency
Web caching techniques reduce user-perceived latency by serving the most popular web objects from an intermediate memory. In order to assure that reused objects are not stale, cond...
Josep Domènech, José A. Gil, Julio S...
NOSSDAV
2010
Springer
13 years 6 months ago
Designing a tit-for-tat based peer-to-peer video-on-demand system
Video-on-demand (VoD) is a next-generation Internet application of increasing interest allowing users to start watching a movie almost instantaneously by downloading the video on-...
Kévin Huguenin, Anne-Marie Kermarrec, Vivek...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 6 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
« Prev « First page 2769 / 2794 Last » Next »