Sciweavers

2863 search results - page 289 / 573
» Constructing minimum-interference networks
Sort
View
JCIT
2007
150views more  JCIT 2007»
15 years 4 months ago
A Dynamic Knowledge Representation Model based on Hybrid Approach
Our fundamental objective is to tackle the problem faced in the field of information retrieval and classification in the current era of information overflow by proposing better an...
Reena T. N. Shetty, Pierre-Michel Riccio, Joë...
JMLR
2010
134views more  JMLR 2010»
14 years 11 months ago
Bayesian Algorithms for Causal Data Mining
We present two Bayesian algorithms CD-B and CD-H for discovering unconfounded cause and effect relationships from observational data without assuming causal sufficiency which prec...
Subramani Mani, Constantin F. Aliferis, Alexander ...
IACR
2011
111views more  IACR 2011»
14 years 4 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
ISICA
2009
Springer
15 years 11 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 11 months ago
ISP-friendly peer selection in P2P networks
Peer-to-peer (P2P) multicast is a scalable solution adopted by many video streaming systems. However, a prevalence of P2P applications has caused heavy traffic on the Internet. W...
Zhijie Shen, Roger Zimmermann