Sciweavers

6652 search results - page 85 / 1331
» On the effective evaluation of TCP
Sort
View
CONEXT
2005
ACM
13 years 9 months ago
Hybrid reliable multicast with TCP-XM
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft, Marinho P. Barcellos, ...
JMLR
2006
113views more  JMLR 2006»
13 years 7 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
APSCC
2008
IEEE
13 years 9 months ago
Measuring the Effectiveness and the Fairness of Relation Hiding Systems
In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. The framework provides a uniform way to define a variety of privacy ...
Andreas Pashalidis
LREC
2010
151views Education» more  LREC 2010»
13 years 9 months ago
Towards Investigating Effective Affective Dialogue Strategies
We describe an experimental Wizard-of-Oz-setup for the integration of emotional strategies into spoken dialogue management. With this setup we seek to evaluate different approache...
Gregor Bertrand, Florian Nothdurft, Steffen Walter...
SIGIR
2012
ACM
11 years 10 months ago
Effect of written instructions on assessor agreement
Assessors frequently disagree on the topical relevance of documents. How much of this disagreement is due to ambiguity in assessment instructions? We have two assessors assess TRE...
William Webber, Bryan Toth, Marjorie Desamito