Sciweavers

9316 search results - page 1796 / 1864
» Analysis of traceback techniques
Sort
View
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ECML
2001
Springer
15 years 4 months ago
Learning of Variability for Invariant Statistical Pattern Recognition
In many applications, modelling techniques are necessary which take into account the inherent variability of given data. In this paper, we present an approach to model class speciļ...
Daniel Keysers, Wolfgang Macherey, Jörg Dahme...
IWQOS
2001
Springer
15 years 4 months ago
Dynamic Core Provisioning for Quantitative Differentiated Service
— Efficient network provisioning mechanisms that support service differentiation and automatic capacity dimensioning are essential to the realization of the Differentiated Servi...
Raymond R.-F. Liao, Andrew T. Campbell
MFCS
2001
Springer
15 years 4 months ago
News from the Online Traveling Repairman
In the traveling repairman problem (Trp), a tour must be found through every one of a set of points (cities) in some metric space such that the weighted sum of completion times of ...
Sven Oliver Krumke, Willem de Paepe, Diana Poensge...
VLDB
2001
ACM
190views Database» more  VLDB 2001»
15 years 4 months ago
LEO - DB2's LEarning Optimizer
Most modern DBMS optimizers rely upon a cost model to choose the best query execution plan (QEP) for any given query. Cost estimates are heavily dependent upon the optimizer’s e...
Michael Stillger, Guy M. Lohman, Volker Markl, Mok...
« Prev « First page 1796 / 1864 Last » Next »