Sciweavers

8316 search results - page 1552 / 1664
» Web Document Modeling
Sort
View
ISSRE
2003
IEEE
14 years 2 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
P2P
2003
IEEE
146views Communications» more  P2P 2003»
14 years 2 months ago
The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery
The peer-to-peer (P2P) model generally requires that bidirectional and direct communications for contentdelivery be set up between user peers after discovery of the desired conten...
Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira ...
SAINT
2003
IEEE
14 years 2 months ago
Bayesian Analysis of Online Newspaper Log Data
In this paper we address the problem of analyzing web log data collected at a typical online newspaper site. We propose a two-way clustering technique based on probability theory....
Hannes Wettig, Jussi Lahtinen, Tuomas Lepola, Petr...
SRDS
2003
IEEE
14 years 2 months ago
Assessing the Dependability of OGSA Middleware by Fault Injection
This paper presents our research on devising a dependability assessment method for the upcoming OGSA 3.0 middleware using network level fault injection. We compare existing DCE mi...
Nik Looker, Jie Xu
SAC
2003
ACM
14 years 2 months ago
Semantic Matchmaking in a P-2-P Electronic Marketplace
Matchmaking is the problem of matching offers and requests, such as supply and demand in a marketplace, services and customers in a service agency, etc., where both partners are ...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
« Prev « First page 1552 / 1664 Last » Next »