Sciweavers

1412 search results - page 157 / 283
» The Value of Outsourced Software
Sort
View
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
15 years 10 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
SIGIR
2004
ACM
15 years 10 months ago
Measuring ineffectiveness
An evaluation methodology that targets ineffective topics is needed to support research on obtaining more consistent retrieval across topics. Using average values of traditional ...
Ellen M. Voorhees
CIKM
2004
Springer
15 years 9 months ago
Grammar-based task analysis of web logs
The daily use of Internet-based services is involved with hundreds of different tasks being performed by multiple users. A single task is typically involved with a sequence of Web...
Savitha Srinivasan, Arnon Amir, Prasad M. Deshpand...
FPL
2004
Springer
117views Hardware» more  FPL 2004»
15 years 9 months ago
Flow Monitoring in High-Speed Networks with 2D Hash Tables
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...
David Nguyen, Joseph Zambreno, Gokhan Memik
ISER
2004
Springer
108views Robotics» more  ISER 2004»
15 years 9 months ago
The SDR Experience: Experiments with a Large-Scale Heterogeneous Mobile Robot Team
This paper reports on experiments conducted as part of the DARPA SDR (Software for Distributed Robotics) program. The core challenge for this program is to develop a system capable...
Andrew Howard, Lynne E. Parker, Gaurav S. Sukhatme