Sciweavers

1780 search results - page 173 / 356
» Polymorphic Contention Management
Sort
View
IMC
2006
ACM
14 years 4 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ECIR
2008
Springer
13 years 11 months ago
Clustering Template Based Web Documents
More and more documents on the World Wide Web are based on templates. On a technical level this causes those documents to have a quite similar source code and DOM tree structure. G...
Thomas Gottron
KCAP
2005
ACM
14 years 3 months ago
Automated story capture from conversational speech
While storytelling has long been recognized as an important part of effective knowledge management in organizations, knowledge management technologies have generally not distingui...
Andrew S. Gordon, Kavita Ganesan
FC
2005
Springer
143views Cryptology» more  FC 2005»
14 years 3 months ago
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
Abstract. This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an in...
Michael Szydlo
WWW
2007
ACM
14 years 11 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...