Sciweavers

1662 search results - page 53 / 333
» Privately Finding Specifications
Sort
View
ACMICEC
2008
ACM
191views ECommerce» more  ACMICEC 2008»
15 years 4 months ago
Why share in peer-to-peer networks?
Prior theory and empirical work emphasize the enormous free-riding problem facing peer-to-peer (P2P) sharing networks. Nonetheless, many P2P networks thrive. We explore two possib...
Lian Jian, Jeffrey K. MacKie-Mason
DSD
2008
IEEE
139views Hardware» more  DSD 2008»
15 years 4 months ago
Revisiting the Cache Effect on Multicore Multithreaded Network Processors
Caching mechanism has achieved great success in general purpose processor; however, its deployment in Network Processor (NP) raises questions over its effectiveness under the new ...
Zhen Liu, Jia Yu, Xiaojun Wang, Bin Liu, Laxmi N. ...
140
Voted
ICWS
2007
IEEE
15 years 4 months ago
Search Algorithms for Discovery of Web Services
Web services are designed to standardize interactions between heterogeneous applications using Internet technologies. Within the framework of Internet search technologies, Web ser...
Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng
110
Voted
DIMVA
2006
15 years 3 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...
136
Voted
DGO
2003
153views Education» more  DGO 2003»
15 years 3 months ago
Improving Access to Large Volumes of Online Data
The Internet has recently become the medium of interaction with large volumes of data. Enterprises in the public and private sectors made their databases available over the Intern...
Egemen Tanin, Hanan Samet