Sciweavers

668 search results - page 110 / 134
» Value-driven Service Matching
Sort
View
HOTI
2005
IEEE
14 years 2 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
ICDM
2005
IEEE
217views Data Mining» more  ICDM 2005»
14 years 2 months ago
Improving Automatic Query Classification via Semi-Supervised Learning
Accurate topical classification of user queries allows for increased effectiveness and efficiency in general-purpose web search systems. Such classification becomes critical if th...
Steven M. Beitzel, Eric C. Jensen, Ophir Frieder, ...
LCN
2005
IEEE
14 years 2 months ago
Delay and Throughput Analysis of IEEE 802.11e EDCA with Starvation Prediction
— An analytical model is proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA provides class-b...
Paal Engelstad, Olav N. Østerbø
SAC
2005
ACM
14 years 2 months ago
Indexing continuously changing data with mean-variance tree
: Traditional spatial indexes like R-tree usually assume the database is not updated frequently. In applications like location-based services and sensor networks, this assumption i...
Yuni Xia, Sunil Prabhakar, Shan Lei, Reynold Cheng...
ATAL
2005
Springer
14 years 2 months ago
Matchmaking multi-party interactions using historical performance data
Matchmaking will be an important component of future agent and agent-like systems, such as the semantic web. Most research on matchmaking has been directed toward sophisticated ma...
David Lambert, David Robertson