Sciweavers

3356 search results - page 329 / 672
» Determining Consensus Numbers
Sort
View
102
Voted
IADIS
2003
15 years 2 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
SDM
2004
SIAM
194views Data Mining» more  SDM 2004»
15 years 2 months ago
Finding Frequent Patterns in a Large Sparse Graph
Graph-based modeling has emerged as a powerful abstraction capable of capturing in a single and unified framework many of the relational, spatial, topological, and other characteri...
Michihiro Kuramochi, George Karypis
106
Voted
SSWMC
2004
15 years 2 months ago
Steganalysis of block-structured stegotext
We study a detection-theoretic approach to steganalysis. The relative entropy between covertext and stegotext determines the steganalyzer's difficulty in discriminating them,...
Ying Wang, Pierre Moulin
100
Voted
WSC
2004
15 years 2 months ago
Optimal Computing Budget Allocation for Multi-Objective Simulation Models
Simulation plays a vital role in identifying the best system design from among a set of competing designs. To improve simulation efficiency, ranking and selection techniques are o...
Loo Hay Lee, Ek Peng Chew, Suyan Teng, David Golds...
SODA
2000
ACM
123views Algorithms» more  SODA 2000»
15 years 2 months ago
Communication complexity of document exchange
We address the problem of minimizing the communication involved in the exchange of similar documents. We consider two users, A and B, who hold documents x and y respectively. Neit...
Graham Cormode, Mike Paterson, Süleyman Cenk ...