• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 282
Next 10 →

Efficient event routing in content-based publish/subscribe service network

by Fengyun Cao, Jaswinder Pal Singh - in Proc. of the 23 rd INFOCOM , 2004
"... Abstract—Efficient event delivery in a content-based publish/subscribe system has been a challenging problem. Existing group communication solutions, such as IP multicast or application-level multicast techniques, are not readily applicable due to the highly heterogeneous communication pattern in su ..."
Abstract - Cited by 47 (1 self) - Add to MetaCart
, and multicastbased approach, which delivers events through a few high-quality multicast groups that are pre-constructed to approximately match user interests. These approaches have different trade-offs in the routing quality achieved and the implementation cost and system load generated. We then present a new

Approved as to style and content by:

by Adam C. Polak, Prof Marco, F. Duarte, Prof Robert, W. Jackson, Prof Brian, N. Levine, Prof C. V. Hollot, Department Chair , 2014
"... This Open Access Dissertation is brought to you for free and open access by the Dissertations and Theses at ScholarWorks@UMass Amherst. It has ..."
Abstract - Add to MetaCart
This Open Access Dissertation is brought to you for free and open access by the Dissertations and Theses at ScholarWorks@UMass Amherst. It has

IMPACT OF CONTENT-BASED PERSONALIZATION IN A SERVICE ENVIRONMENT

by A Case Study, Erik Wallin
"... Today’s increasing information supply raises the need for more effective and automated information processing where personalization is one possible solution. Most of the first generation personalization systems lacked the ability to easily define and measure the effectiveness of the personalization ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
the ability to perform bifurcation. The system tracks the end-user’s behavior and uses content adapting methods for presenting information to the end-users. Bifurcation is the process of dividing the users into two or more control-groups. Two different companies had their websites personalized and evaluated

A User-Centered Content Architecture for an Academic Digital Research Portal

by Erika Rogers, Mary M. Somerville, Alissa Randles - In Proceedings of ED-MEDIA 2005 – World Conference on Educational Multimedia, Hypermedia, & Telecommunications , 2005
"... As part of the digital evolution of libraries, librarians are now expected to serve in new roles as knowledge mediators, and to provide much more technologically based support and assistance for students ’ progress towards information literacy. This paper describes an ongoing collaborative project b ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
between students and library personnel to incorporate usability evaluation, interaction design techniques, and instructional design theories in the design and development of a flexible web-based Research Portal. With the rapidly increasing incorporation of technology in academic environments, many feel

A Study of User-Friendly Hash Comparison Schemes

by unknown authors
"... Abstract—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usab ..."
Abstract - Add to MetaCart
comparison. To evaluate the schemes, we performed an online user study with more than 400 participants. Our findings indicate that only a small number of schemes allow quick and accurate comparison across a wide range of subjects from varying backgrounds. Keywords-Security; Human factors I.

The cacheand-forward network architecture for efficient mobile content delivery services in the future internet

by Sanjoy Paul, Roy Yates, Dipankar Raychaudhuri, Jim Kurose - in Innovations in NGN: Future Network and Services , 2008
"... This paper presents a novel “cache-and-forward ” (CNF) protocol architecture for mobile content delivery services in the future Internet. The CNF architecture can be implemented as an overlay on top of the Internet Protocol (IP), or as a clean slate protocol for next-generation networks. CNF is base ..."
Abstract - Cited by 31 (10 self) - Add to MetaCart
This paper presents a novel “cache-and-forward ” (CNF) protocol architecture for mobile content delivery services in the future Internet. The CNF architecture can be implemented as an overlay on top of the Internet Protocol (IP), or as a clean slate protocol for next-generation networks. CNF

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system

Generating Traffic Distributions For ATM Networks: A Cellular Automaton Implementation

by Zhonghui Yao, David C. Blight
"... : ATM networks are designed for the transmission of a wide variety of applications, each having different traffic characteristics. A Cellular Automaton (CA) can effectively generate random patterns which have good randomness characteristics. This paper makes the first step to use 1-D LHCA to generat ..."
Abstract - Add to MetaCart
to generate random traffic distributions for ATM networks. Key words: ATM, traffic model, CA, hardware implementation. I. Introduction ATM (Asynchronous Transfer Mode) is designed to support the integration of high quality voice, video and high speed data traffic. To the end user, it provides the ability

Extracting Content for News Web Pages based on DOM

by Hua Geng, Qiang Gao, Jingui Pan - Intl. Jour. of Computer Science and Network Security (IJCSNS
"... Nowadays, RSS is becoming a hot topic for Web applications. A lot of famous Web sites have provided RSS for users. However, making RSS files manually is boring, and so far, most sites haven’t provided such a service. In this paper, we mainly describe the design, implementation and evaluation of HTML ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Nowadays, RSS is becoming a hot topic for Web applications. A lot of famous Web sites have provided RSS for users. However, making RSS files manually is boring, and so far, most sites haven’t provided such a service. In this paper, we mainly describe the design, implementation and evaluation

C © 2004 Kluwer Academic Publishers. Printed in the Netherlands. Designing and Implementing an Open Infrastructure for Location-Based, Tourism-Related Content Delivery

by G. Kakaletris, D. Varoutas, D. Katsianis, T. Sphicopoulos, G. Kouvas
"... Abstract. The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value-added services on top of their high cost infrastructures. Latest advances in self and network-assisted positioning technologies, enable the provisio ..."
Abstract - Add to MetaCart
the provision of services that make use of the actual mobile user location. This paper presents the key points and considerations of a detailed approach for designing, developing and evaluating a very low-cost infrastructure, capable of providing tourism content related location-based services. The main effort
Next 10 →
Results 1 - 10 of 282
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University