Sciweavers

1414 search results - page 222 / 283
» Combining Intruder Theories
Sort
View
EMSOFT
2010
Springer
14 years 7 months ago
Energy-aware packet and task co-scheduling for embedded systems
A crucial objective in battery operated embedded systems is to work under the minimal power consumption that provides a desired level of performance. Dynamic Voltage Scaling (DVS)...
Luca Santinelli, Mauro Marinoni, Francesco Prosper...
ICML
2010
IEEE
14 years 7 months ago
Comparing Clusterings in Space
This paper proposes a new method for comparing clusterings both partitionally and geometrically. Our approach is motivated by the following observation: the vast majority of previ...
Michael H. Coen, M. Hidayath Ansari, Nathanael Fil...
SOCIALCOM
2010
14 years 7 months ago
On the Navigability of Social Tagging Systems
It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in, for example, the increasing number ...
Denis Helic, Christoph Trattner, Markus Strohmaier...
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
14 years 7 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
ACIIDS
2009
IEEE
159views Database» more  ACIIDS 2009»
14 years 7 months ago
Application to GA-Based Fuzzy Control for Nonlinear Systems with Uncertainty
In this study, we strive to combine the advantages of fuzzy theory, genetic algorithms (GA), H tracking control schemes, smooth control and adaptive laws to design an adaptive fuzz...
Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Chen-Yuan Ch...