Sciweavers

1733 search results - page 145 / 347
» Self-Similarity in File Systems
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 4 months ago
An Empirical Study on Content Bundling in BitTorrent Swarming System
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. ...
Jinyoung Han, Taejoong Chung, Seungbae Kim, Hyunch...
CSREASAM
2006
15 years 5 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
EDBT
2008
ACM
124views Database» more  EDBT 2008»
16 years 4 months ago
Multi-dimensional search for personal information management systems
With the explosion in the amount of semi-structured data users access and store in personal information management systems, there is a need for complex search tools to retrieve of...
Amélie Marian, Christopher Peery, Thu D. Ng...
IPPS
2007
IEEE
15 years 10 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
VIP
2003
15 years 5 months ago
Screen Capture - A Vector Quantisation Approach
Over the last couple of decades, more and more presentations are done on computer screen. The need to store or broadcast such presentation efficiently is in high demand across dif...
Jesse S. Jin, Sue R. Wu