Sciweavers

497 search results - page 97 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
IMC
2006
ACM
14 years 1 months ago
Quantifying path exploration in the internet
A number of previous measurement studies [10, 12, 17] have shown the existence of path exploration and slow convergence in the global Internet routing system, and a number of prot...
Ricardo V. Oliveira, Beichuan Zhang, Dan Pei, Rafi...
IMC
2005
ACM
14 years 29 days ago
The Power of Slicing in Internet Flow Measurement
Flow measurement evolved into the primary method for measuring the composition of Internet traffic. Large ISPs and small networks use it to track dominant applications, dominant ...
Ramana Rao Kompella, Cristian Estan
CLEF
2005
Springer
14 years 28 days ago
Thomson Legal and Regulatory Experiments at CLEF-2005
For the 2005 Cross-Language Evaluation Forum, Thomson Legal and Regulatory participated in the Hungarian, French, and Portuguese monolingual search tasks as well as French-to-Port...
Isabelle Moulinier, Ken Williams
MOBICOM
2004
ACM
14 years 24 days ago
Using code collection to support large applications on mobile devices
The progress of mobile device technology unfolds a new spectrum of applications that challenges conventional infrastructure models. Most of these devices are perceived by their us...
Lucian Popa 0002, Irina Athanasiu, Costin Raiciu, ...
VRML
2003
ACM
14 years 19 days ago
Viewpoint adaptation during navigation based on stimuli from the virtual environment
We consider the possibility of automatically modifying the user’s viewpoint orientation for the purpose of enhancing the navigation experience. We concentrate on outdoor virtual...
Szilárd Kiss, Anton Nijholt