Sciweavers

2409 search results - page 329 / 482
» Reverse engineering the Internet
Sort
View
146
Voted
COMSUR
2011
196views Hardware» more  COMSUR 2011»
14 years 4 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...
WWW
2009
ACM
16 years 5 months ago
Searching for events in the blogosphere
Over the last few years, blogs (web logs) have gained massive popularity and have become one of the most influential web social media in our times. Every blog post in the Blogosph...
Manolis Platakis, Dimitrios Kotsakos, Dimitrios Gu...
155
Voted
WWW
2009
ACM
16 years 5 months ago
Identifying vertical search intention of query through social tagging propagation
A pressing task during the unification process is to identify a user's vertical search intention based on the user's query. In this paper, we propose a novel method to p...
Ning Liu, Jun Yan, Weiguo Fan, Qiang Yang, Zheng C...
WWW
2009
ACM
16 years 5 months ago
MASTH proxy: an extensible platform for web overload control
Many overload control mechanisms for Web based applications aim to prevent overload by setting limits on factors such as admitted load, number of server threads, buffer size. For ...
Vipul Mathur, Sanket Dhopeshwarkar, Varsha Apte
WWW
2009
ACM
16 years 5 months ago
Exploiting web search to generate synonyms for entities
Tasks recognizing named entities such as products, people names, or locations from documents have recently received significant attention in the literature. Many solutions to thes...
Surajit Chaudhuri, Venkatesh Ganti, Dong Xin