Sciweavers

3343 search results - page 139 / 669
» Network Objects
Sort
View
CCR
2004
106views more  CCR 2004»
13 years 8 months ago
Beware of BGP attacks
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and...
Ola Nordström, Constantinos Dovrolis
IEEEAMS
2003
IEEE
14 years 2 months ago
Rich and Scalable Peer-to-Peer Search with SHARK
SHARK is a novel concept and middleware service for search in peer-to-peer (P2P) networks. Rather than flooding a network like Gnutella or imposing numerical IDs on objects like d...
Jan Mischke, Burkhard Stiller
ICPR
2010
IEEE
14 years 2 months ago
Social Network Approach to Analysis of Soccer Game
Video understanding has been an active area of research, where many articles have been published on how to detect and track objects in videos, and how to analyze their trajectorie...
Kyoung-Jin Park, Alper Yilmaz
COMPCON
1994
IEEE
14 years 1 months ago
The Newton Application Architecture
The application architecture of Newton, a technology for supporting Personal Digital Assistants (PDAs), is described. It combines a dynamic, object-oriented language called Newton...
Walter R. Smith
TC
2002
13 years 8 months ago
Coordinated En-Route Web Caching
Web caching is an important technique for reducing Internet access latency, network traffic, and server load. This paper investigates cache management strategies for en-route web ...
Xueyan Tang, Samuel T. Chanson