Sciweavers

761 search results - page 136 / 153
» Concise and Consistent Naming
Sort
View
CIDM
2009
IEEE
15 years 1 months ago
Empirical comparison of graph classification algorithms
The graph classification problem is learning to classify separate, individual graphs in a graph database into two or more categories. A number of algorithms have been introduced fo...
Nikhil S. Ketkar, Lawrence B. Holder, Diane J. Coo...
100
Voted
ICDCS
2010
IEEE
15 years 1 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 1 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
SPIEVIP
2008
14 years 12 months ago
Adaptive methods of two-scale edge detection in post-enhancement visual pattern processing
Adaptive methods are defined and experimentally studied for a two-scale edge detection process that mimics human visual perception of edges and is inspired by the parvo-cellular (...
Zia-ur Rahman, Daniel J. Jobson, Glenn A. Woodell
92
Voted
ASIACRYPT
2008
Springer
14 years 11 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi