黄瓜 发表于 2025-3-28 18:05:24

Graph-Theoretic Web Algorithms: An Overviewsents a Web page and an edge represents a hyperlink. Currently the number of nodes in this gigantic Web graph is over four billion and is growing by more than seven million nodes a day—without any centralized control. The study of this graph is essential for designing efficient algorithms for crawli

handle 发表于 2025-3-28 20:24:32

Prefetching Tiled Internet Data Using a Neighbor Selection Markov Chainuture tiles while the current one is being displayed. Traditional prefetching techniques examine the transition probabilities among the tiles to predict the next tile to be requested. However, when the tile space is very huge, and a large portion of it is accessed with even distribution, it is very

通便 发表于 2025-3-29 00:07:11

A General Adaptive Cache Coherency-Replacement Scheme for Distributed Systems with the objective of optimizing the distributed cache system performance. We examine different distributed platforms (shared memory systems, distributed memory systems, and web proxy cache systems) and the potential of incorporating coherency-replacement issues in the cache memory management syste

修饰 发表于 2025-3-29 06:16:14

Agents Based Collaborative Framework for B2C Business Model and Related Servicesrtificial Intelligence, Knowledge-based system in a seamless manner for specialised activities under distributed computing environments. In this paper we address the issues of incorporating the valued-added services within the B2C model and propose a solution based on the software agents. We present

一美元 发表于 2025-3-29 10:05:54

http://reply.papertrans.cn/47/4674/467400/467400_45.png

HUSH 发表于 2025-3-29 13:14:50

http://reply.papertrans.cn/47/4674/467400/467400_46.png

Atheroma 发表于 2025-3-29 16:26:03

http://reply.papertrans.cn/47/4674/467400/467400_47.png

Confess 发表于 2025-3-29 20:19:57

http://reply.papertrans.cn/47/4674/467400/467400_48.png

famine 发表于 2025-3-30 02:25:39

Hardware Security Concept for Spontaneous Network Integration of Mobile Devicestwork environment. The usage of this device is illustrated by a number of examples. The hardware and software components are presented. Particular, we compare Bluetooth and Infrared (IrDA) wireless networking technology, explain the usage of biometrics recognition methods, clarify the choice of the

Immunization 发表于 2025-3-30 04:08:40

long-term preservation of DNA and useful molecular clues to the grass species utilized by neolithic men to manufacture their equipment (see “DNA analysis of the grass remains found at the Iceman’s archaeological site”, this volume). The results of the analyses, however, have also posed a number of
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Innovative Internet Computing Systems; International Worksh Thomas Böhme,Herwig Unger Conference proceedings 2001 Springer-Verlag Berlin He