Sciweavers

4435 search results - page 743 / 887
» Networking named content
Sort
View
P2P
2005
IEEE
14 years 3 months ago
Video Management in Peer-to-Peer Systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
SISW
2005
IEEE
14 years 3 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
SIGCPR
2005
ACM
66views Hardware» more  SIGCPR 2005»
14 years 3 months ago
Who is "the IT workforce"?: challenges facing policy makers, educators, management, and research
Despite over six decades of research on the role and definition of the IT workforce, there remain numerous, and often contradictory, definitions related to the identity of this gr...
Michelle L. Kaarst-Brown, Indira R. Guzman
ICNC
2005
Springer
14 years 3 months ago
Harmony Search for Generalized Orienteering Problem: Best Touring in China
In order to overcome the drawbacks of mathematical optimization techniques, soft computing algorithms have been vigorously introduced during the past decade. However, there are sti...
Zong Woo Geem, Chung-Li Tseng, Yongjin Park
ISMIS
2005
Springer
14 years 3 months ago
Towards Ad-Hoc Rule Semantics for Gene Expression Data
The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional (or multivalued) dependencies in databases. ...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki