Sciweavers

18924 search results - page 3464 / 3785
» Conformance of Distributed Systems
Sort
View
SEC
2008
15 years 6 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
SIMUTOOLS
2008
15 years 6 months ago
Opportunistic networking in OMNeT++
This work describes mechanisms for simulating opportunistic and delay-tolerant networks in the OMNeT++ discrete event simulator. The mechanisms allow for simulating open systems o...
Ólafur Ragnar Helgason, Kristján Val...
126
Voted
NIPS
2007
15 years 6 months ago
Stability Bounds for Non-i.i.d. Processes
The notion of algorithmic stability has been used effectively in the past to derive tight generalization bounds. A key advantage of these bounds is that they are designed for spec...
Mehryar Mohri, Afshin Rostamizadeh
NIPS
2007
15 years 6 months ago
Random Projections for Manifold Learning
We propose a novel method for linear dimensionality reduction of manifold modeled data. First, we show that with a small number M of random projections of sample points in RN belo...
Chinmay Hegde, Michael B. Wakin, Richard G. Barani...
SBBD
2007
165views Database» more  SBBD 2007»
15 years 6 months ago
Peer-to-Peer Information Search
We consider the network structure and query processing capabilities of social communities like bookmarks and photo sharing communities such as del.icio.us or flickr. A common fea...
Sebastian Michel, Josiane Xavier Parreira
« Prev « First page 3464 / 3785 Last » Next »