Sciweavers

2715 search results - page 422 / 543
» Network bucket testing
Sort
View
125
Voted
WS
2010
ACM
15 years 29 days ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
149
Voted
EMNLP
2010
15 years 18 days ago
What's with the Attitude? Identifying Sentences with Attitude in Online Discussions
Mining sentiment from user generated content is a very important task in Natural Language Processing. An example of such content is threaded discussions which act as a very import...
Ahmed Hassan, Vahed Qazvinian, Dragomir R. Radev
132
Voted
PERCOM
2010
ACM
15 years 15 days ago
A tool suite to prototype pervasive computing applications
Abstract--Despite much progress, developing a pervasive computing application remains a challenge because of a lack of conceptual frameworks and supporting tools. This challenge in...
Damien Cassou, Julien Bruneau, Charles Consel
155
Voted
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
15 years 14 days ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
ICUMT
2009
15 years 10 days ago
Service and Resource Discovery supports over P2P overlays
We describe the main architecture and the design principles of the Service/Resource Discovery System (SRDS), a component of the XtreemOS Operating System. XtreemOS is a Linux exten...
Emanuele Carlini, Massimo Coppola, Patrizio Dazzi,...