Sciweavers

1040 search results - page 107 / 208
» A New Periodicity Lemma
Sort
View
LCN
2005
IEEE
15 years 7 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
15 years 7 months ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
WISE
2005
Springer
15 years 7 months ago
Decomposition-Based Optimization of Reload Strategies in the World Wide Web
Web sites, Web pages and the data on pages are available only for specific periods of time and are deleted afterwards from a client’s point of view. An important task in order t...
Dirk Kukulenz
AE
2005
Springer
15 years 7 months ago
Outlines of Artificial Life: A Brief History of Evolutionary Individual Based Models
In the research field of Artificial Life, the concepts of emergence and adaptation form the basis of a class of models which describes reproducing individuals whose characteristics...
Stefan Bornhofen, Claude Lattaud
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
15 years 7 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young