Sciweavers

2715 search results - page 422 / 543
» Network bucket testing
Sort
View
WS
2010
ACM
13 years 6 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
EMNLP
2010
13 years 6 months ago
What's with the Attitude? Identifying Sentences with Attitude in Online Discussions
Mining sentiment from user generated content is a very important task in Natural Language Processing. An example of such content is threaded discussions which act as a very import...
Ahmed Hassan, Vahed Qazvinian, Dragomir R. Radev
PERCOM
2010
ACM
13 years 5 months ago
A tool suite to prototype pervasive computing applications
Abstract--Despite much progress, developing a pervasive computing application remains a challenge because of a lack of conceptual frameworks and supporting tools. This challenge in...
Damien Cassou, Julien Bruneau, Charles Consel
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
13 years 5 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
ICUMT
2009
13 years 5 months ago
Service and Resource Discovery supports over P2P overlays
We describe the main architecture and the design principles of the Service/Resource Discovery System (SRDS), a component of the XtreemOS Operating System. XtreemOS is a Linux exten...
Emanuele Carlini, Massimo Coppola, Patrizio Dazzi,...