Sciweavers

3657 search results - page 585 / 732
» A Study of Practical Deduplication
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
INFOCOM
2010
IEEE
14 years 8 months ago
Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks
Abstract--Achieving fast, precise, and scalable fault localization has long been a highly desired feature in all-optical mesh networks. Monitoring tree (m-tree) is an interesting m...
János Tapolcai, Lajos Rónyai, Pin-Ha...
MOBIHOC
2010
ACM
14 years 8 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling
MOBIHOC
2010
ACM
14 years 8 months ago
Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach
In geographic (or geometric) routing, messages are expected to route in a greedy manner: the current node always forwards a message to its neighbor node that is closest to the des...
Anne-Marie Kermarrec, Guang Tan
PKDD
2010
Springer
153views Data Mining» more  PKDD 2010»
14 years 8 months ago
A Robustness Measure of Association Rules
Abstract. We propose a formal definition of the robustness of association rules for interestingness measures. It is a central concept in the evaluation of the rules and has only be...
Yannick Le Bras, Patrick Meyer, Philippe Lenca, St...