Sciweavers

1993 search results - page 335 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
EUROPAR
2006
Springer
15 years 1 months ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal
PEPM
2000
ACM
15 years 1 months ago
Calculating Sized Types
Many program optimisations and analyses, such as arraybound checking, termination analysis, etc, dependon knowing the size of a function's input and output. However, size inf...
Wei-Ngan Chin, Siau-Cheng Khoo
CIKM
2008
Springer
14 years 11 months ago
Representative entry selection for profiling blogs
Many applications on blog search and mining often meet the challenge of handling huge volume of blog data, in which one single blog could contain hundreds or even thousands of ent...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun, Rong ...
CIKM
2008
Springer
14 years 11 months ago
Kernel methods, syntax and semantics for relational text categorization
Previous work on Natural Language Processing for Information Retrieval has shown the inadequateness of semantic and syntactic structures for both document retrieval and categoriza...
Alessandro Moschitti
DCOSS
2010
Springer
14 years 11 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen