Sciweavers

10396 search results - page 1805 / 2080
» Deployment Support Network
Sort
View
CSFW
2012
IEEE
13 years 6 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
INFOCOM
2009
IEEE
15 years 11 months ago
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
WWW
2007
ACM
16 years 5 months ago
Web4CE: accessing web-based applications on consumer devices
In a world where all devices will be interconnected, the boundaries between the different devices will start to disappear. Devices will be able to access each other's applica...
Walter Dees, Paul Shrubsole
WWW
2006
ACM
16 years 5 months ago
Analysis of WWW traffic in Cambodia and Ghana
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
Bowei Du, Michael J. Demmer, Eric A. Brewer
KDD
2004
ACM
166views Data Mining» more  KDD 2004»
16 years 4 months ago
Predicting prostate cancer recurrence via maximizing the concordance index
In order to effectively use machine learning algorithms, e.g., neural networks, for the analysis of survival data, the correct treatment of censored data is crucial. The concordan...
Lian Yan, David Verbel, Olivier Saidi
« Prev « First page 1805 / 2080 Last » Next »