Sciweavers

323 search results - page 60 / 65
» Doing it right
Sort
View
DSS
2006
140views more  DSS 2006»
14 years 11 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
CN
2007
76views more  CN 2007»
14 years 11 months ago
A practical and robust inter-domain marking scheme for IP traceback
A practical and robust inter-domain marking scheme for IP traceback is proposed. We first identify six drawbacks of Probabilistic Packet Marking (PPM), and then contrive a synerg...
Zhiqiang Gao, Nirwan Ansari
COMCOM
2007
78views more  COMCOM 2007»
14 years 11 months ago
On TCP performance over asymmetric satellite links with real-time constraints
Real-time transmission over asymmetric satellite IP links is challenging, since satellite systems commonly exhibit long propagation delays, while bandwidth asymmetry often enforce...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
COMCOM
2007
125views more  COMCOM 2007»
14 years 11 months ago
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Energy is the most crucial but scarce resource in wireless sensor networks (WSNs). A wealth of MAC protocols are proposed only to prolong the network lifetime for energy-efficienc...
Yongsub Nam, Taekyoung Kwon, Hojin Lee, Hakyung Ju...
JAIR
2008
135views more  JAIR 2008»
14 years 11 months ago
On Similarities between Inference in Game Theory and Machine Learning
In this paper, we elucidate the equivalence between inference in game theory and machine learning. Our aim in so doing is to establish an equivalent vocabulary between the two dom...
Iead Rezek, David S. Leslie, Steven Reece, Stephen...