Sciweavers

194 search results - page 29 / 39
» Services surround you
Sort
View
ICC
2009
IEEE
112views Communications» more  ICC 2009»
14 years 1 months ago
Understanding the Roles of Servers in Large-Scale Peer-Assisted Online Storage Systems
—Online storage systems that provide versatile and convenient platforms for content distribution have attracted significant attention over the Internet. To guarantee adequate le...
Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang
SIGIR
2009
ACM
14 years 1 months ago
Automatic video tagging using content redundancy
The analysis of the leading social video sharing platform YouTube reveals a high amount of redundancy, in the form of videos with overlapping or duplicated content. In this paper,...
Stefan Siersdorfer, José San Pedro, Mark Sa...
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 1 months ago
DYSWIS: An architecture for automated diagnosis of networks
As the complexity of networked systems increases, we need mechanisms to automatically detect failures in the network and diagnose the cause of such failures. To realize true self-...
Vishal Kumar Singh, Henning Schulzrinne, Kai Miao
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 1 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 26 days ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee