Sciweavers

487 search results - page 95 / 98
» A Compiled Implementation of Normalization by Evaluation
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 15 days ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ICASSP
2007
IEEE
14 years 14 days ago
Integrating Relevance Feedback in Boosting for Content-Based Image Retrieval
Many content-based image retrieval applications suffer from small sample set and high dimensionality problems. Relevance feedback is often used to alleviate those problems. In thi...
Jie Yu, Yijuan Lu, Yuning Xu, Nicu Sebe, Qi Tian
SASN
2006
ACM
14 years 3 days ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
DAMAS
2005
Springer
13 years 11 months ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...
ICDCS
2010
IEEE
13 years 10 months ago
A Hybrid Approach to High Availability in Stream Processing Systems
Abstract—Stream processing is widely used by today’s applications such as financial data analysis and disaster response. In distributed stream processing systems, machine fail...
Zhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, ...