Sciweavers

10396 search results - page 1739 / 2080
» Deployment Support Network
Sort
View
131
Voted
ECML
2007
Springer
15 years 9 months ago
Modeling Highway Traffic Volumes
Most traffic management and optimization tasks, such as accident detection or optimal vehicle routing, require an ability to adequately model, reason about and predict irregular an...
Tomás Singliar, Milos Hauskrecht
189
Voted
ECRIME
2007
15 years 9 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
123
Voted
CSE
2009
IEEE
15 years 9 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
DEBS
2009
ACM
15 years 9 months ago
Efficient event-based resource discovery
The ability to find services or resources that satisfy some criteria is an important aspect of distributed systems. This paper presents an event-based architecture to support more...
Wei Yan, Songlin Hu, Vinod Muthusamy, Hans-Arno Ja...
EICS
2009
ACM
15 years 9 months ago
Flexible and efficient platform modeling for distributed interactive systems
Distributed interactive systems often rely on platform information, used for example when migrating a user interface to a small-screen device, or when opportunistically recruiting...
Xiao Feng Qiu, T. C. Nicholas Graham
« Prev « First page 1739 / 2080 Last » Next »