Sciweavers

1977 search results - page 325 / 396
» internet 2008
Sort
View
SAINT
2008
IEEE
15 years 11 months ago
Distributed Sensor Information Management Architecture Based on Semantic Analysis of Sensing Data
In the ubiquitous computing environment, we believe that P2P-based context-aware application utilizing sensing data is important. However, since sensors are not placed under the c...
Tomoya Kawakami, Bich Lam Ngoc Ly, Susumu Takeuchi...
148
Voted
ASWC
2008
Springer
15 years 6 months ago
ROC: A Method for Proto-ontology Construction by Domain Experts
Abstract. Ontology construction is a labour-intensive and costly process. Even though many formal and semi-formal vocabularies are available, creating an ontology for a specific ap...
Nicole J. J. P. Koenderink, Mark van Assem, J. Lar...
151
Voted
CIMCA
2008
IEEE
15 years 11 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
151
Voted
IMC
2010
ACM
15 years 2 months ago
YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective
In this paper we conduct an extensive and in-depth study of traffic exchanged between YouTube data centers and its users, as seen from the perspective of a tier-1 ISP in Spring 20...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
164
Voted
CORR
2008
Springer
150views Education» more  CORR 2008»
15 years 4 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot