Sciweavers

2060 search results - page 212 / 412
» Performability Evaluation of Networked Storage Systems Using...
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
Enhancing Bluetooth Connectivity with RFID
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential opt...
Timo Salminen, Simo Hosio, Jukka Riekki
CLEF
2007
Springer
14 years 3 months ago
Using Pseudo-Relevance Feedback to Improve Image Retrieval Results
In this paper, we propose a pseudo-relevance feedback method to deal with the photographic retrieval and medical retrieval tasks of ImageCLEF 2007. The aim of our participation to...
Mouna Torjmen, Karen Pinel-Sauvagnat, Mohand Bough...
GLOBECOM
2008
IEEE
14 years 3 months ago
Distributed and Dynamic Resource Allocation for Delay Sensitive Network Services
—In this paper, we present a distributed algorithm to dynamically allocate the available resources of a service-oriented network to delay sensitive network services. We use a uti...
Michael G. Kallitsis, Robert D. Callaway, Michael ...
WWW
2004
ACM
14 years 10 months ago
Automatic detection of fragments in dynamically generated web pages
Dividing web pages into fragments has been shown to provide significant benefits for both content generation and caching. In order for a web site to use fragment-based content gen...
Lakshmish Ramaswamy, Arun Iyengar, Ling Liu, Fred ...
RAID
2000
Springer
14 years 26 days ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...