Sciweavers

2187 search results - page 436 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
DOCENG
2011
ACM
12 years 7 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 9 months ago
What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
Graham Cormode, S. Muthukrishnan, Wei Zhuang
WWW
2005
ACM
14 years 8 months ago
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
While overall bandwidth in the internet has grown rapidly over the last few years, and an increasing number of clients enjoy broadband connectivity, many others still access the i...
Utku Irmak, Torsten Suel
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 2 months ago
Policy-Based QoS-Aware Packet Scheduling for CDMA 1x Ev-DO
— CDMA 1x Ev-DO is an evolution of the CDMA2000 3G wireless standard to enable high rate packet data services up to 2.4Mbps in Rev 0, 3.1Mbps in Rev A, and 4.9Mbps in Rev B. To s...
Jinho Hwang, M. Tamer Refaei, Hyeong-Ah Choi, Jae-...
LCN
2006
IEEE
14 years 1 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “best...
Murad Abusubaih, James Gross, Sven Wiethölter...