Sciweavers

14774 search results - page 2837 / 2955
» Computational complexity and evolutionary computation
Sort
View
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 11 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
178
Voted
ICDM
2008
IEEE
401views Data Mining» more  ICDM 2008»
15 years 11 months ago
Graph OLAP: Towards Online Analytical Processing on Graphs
OLAP (On-Line Analytical Processing) is an important notion in data analysis. Recently, more and more graph or networked data sources come into being. There exists a similar need ...
Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han, Phil...
148
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
15 years 11 months ago
Biomimetic grasp planning for cortical control of a robotic hand
— In this paper we outline a grasp planning system designed to augment the cortical control of a prosthetic arm and hand. A key aspect of this task is the presence of on-line use...
Matei T. Ciocarlie, Samuel T. Clanton, M. Chance S...
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 11 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
« Prev « First page 2837 / 2955 Last » Next »