Sciweavers

5269 search results - page 966 / 1054
» order 2007
Sort
View
ACSAC
2007
IEEE
15 years 8 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
MIDDLEWARE
2007
Springer
15 years 10 months ago
A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications
Abstract. The success of Internet telephony services like Skype illustrates the feasibility of utilizing unstructured Peer-to-Peer (P2P) networks as an economical platform for supp...
Jianjun Zhang, Ling Liu, Lakshmish Ramaswamy, Gong...
ICDAR
2007
IEEE
15 years 8 months ago
Google Book Search: Document Understanding on a Massive Scale
Unveiled in late 2004, Google Book Search is an ambitious program to make all the world's books discoverable online. The sheer scale of the problem brings a number of unique ...
L. Vincent
NAR
2007
85views more  NAR 2007»
15 years 4 months ago
The TIGR Rice Genome Annotation Resource: improvements and new features
In The Institute for Genomic Research Rice Genome Annotation project (http://rice.tigr.org), we have continued to update the rice genome sequence with new data and improve the qua...
Shu Ouyang, Wei Zhu, John A. Hamilton Jr., Haining...
COORDINATION
2007
Springer
15 years 10 months ago
Requirements for Routing in the Application Layer
In the application layer of networks, many application servers are middleboxes in the paths of messages from source to destination. Applications require, as a basic coordination me...
Pamela Zave