Sciweavers

22121 search results - page 4351 / 4425
» Modeling annotated data
Sort
View
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 24 days ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 24 days ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
ICNP
2002
IEEE
14 years 24 days ago
Service Overlay Networks: SLAs, QoS and Bandwidth Provisioning
We advocate the notion of service overlay network (SON) as an effective means to address some of the issues, in particular, end-to-end QoS, plaguing the current Internet, and to f...
Zhenhai Duan, Zhi-Li Zhang, Yiwei Thomas Hou
ICPP
2002
IEEE
14 years 24 days ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
IDEAS
2002
IEEE
113views Database» more  IDEAS 2002»
14 years 23 days ago
Scalable QoS-Aware Disk-Scheduling
A new quality of service (QoS) aware disk scheduling algorithm is presented. It is applicable in environments where data requests arrive with different QoS requirements such as re...
Walid G. Aref, Khaled El-Bassyouni, Ibrahim Kamel,...
« Prev « First page 4351 / 4425 Last » Next »