Sciweavers

4435 search results - page 761 / 887
» Networking named content
Sort
View
CNSM
2010
13 years 8 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood
APWEB
2009
Springer
13 years 8 months ago
Core-Tag Clustering for Web 2.0 Based on Multi-similarity Measurements
Along with the development of Web2.0, folksonomy has become a hot topic related to data mining, information retrieval and social network. The tag semantic is the key for deep under...
Yexi Jiang, Changjie Tang, Kaikuo Xu, Lei Duan, Li...
I3E
2009
149views Business» more  I3E 2009»
13 years 8 months ago
Facilitating Business to Government Interaction Using a Citizen-Centric Web 2.0 Model
Modelling Business to Government (B2G) interaction is considered to be more complex than Citizen to Government (C2G) interaction, since the concept of authorized citizens, represen...
Alexandros Dais, Mara Nikolaidou, Dimosthenis Anag...
ICUMT
2009
13 years 7 months ago
A COP for cooperation in a P2P streaming protocol
This paper introduces a Combinatory Optimization Problem (COP) which captures the performance in cooperation of a P2P Streaming Network, considered at the buffer level. A new famil...
María Elisa Bertinat, Darío Padula, ...
TIT
2011
209views more  TIT 2011»
13 years 5 months ago
Belief Propagation and LP Relaxation for Weighted Matching in General Graphs
Loopy belief propagation has been employed in a wide variety of applications with great empirical success, but it comes with few theoretical guarantees. In this paper we analyze t...
Sujay Sanghavi, Dmitry M. Malioutov, Alan S. Wills...