Sciweavers

487 search results - page 95 / 98
» A Compiled Implementation of Normalization by Evaluation
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 5 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
117
Voted
ICASSP
2007
IEEE
15 years 5 months ago
Integrating Relevance Feedback in Boosting for Content-Based Image Retrieval
Many content-based image retrieval applications suffer from small sample set and high dimensionality problems. Relevance feedback is often used to alleviate those problems. In thi...
Jie Yu, Yijuan Lu, Yuning Xu, Nicu Sebe, Qi Tian
SASN
2006
ACM
15 years 5 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
DAMAS
2005
Springer
15 years 5 months ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...
ICDCS
2010
IEEE
15 years 3 months ago
A Hybrid Approach to High Availability in Stream Processing Systems
Abstract—Stream processing is widely used by today’s applications such as financial data analysis and disaster response. In distributed stream processing systems, machine fail...
Zhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, ...