Sciweavers

5856 search results - page 1016 / 1172
» Developing Query Patterns
Sort
View
JNW
2008
167views more  JNW 2008»
14 years 10 months ago
Analyzing the ENRON Communication Network Using Agent-Based Simulation
Agent-based modeling, simulation, and network analysis approaches are one of the emergent techniques among soft computing literature. This paper presents an agent-based model for a...
Shinako Matsuyama, Takao Terano
KES
2008
Springer
14 years 10 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
JOT
2006
121views more  JOT 2006»
14 years 10 months ago
Constructing persistent object-oriented models with standard C++
In this paper, it is suggested an approach and a design pattern for developing object-oriented models that need to be persistent, including the databases of moderate size, with us...
Alexander Kozynchenko
93
Voted
JSAC
2006
165views more  JSAC 2006»
14 years 10 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
MAM
2006
125views more  MAM 2006»
14 years 10 months ago
Stream computations organized for reconfigurable execution
Reconfigurable systems can offer the high spatial parallelism and fine-grained, bit-level resource control traditionally associated with hardware implementations, along with the f...
André DeHon, Yury Markovsky, Eylon Caspi, M...
« Prev « First page 1016 / 1172 Last » Next »