Sciweavers

455 search results - page 69 / 91
» Dynamic well-spaced point sets
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SIGMOD
2009
ACM
190views Database» more  SIGMOD 2009»
15 years 10 months ago
DataLens: making a good first impression
When a database query has a large number of results, the user can only be shown one page of results at a time. One popular approach is to rank results such that the "best&quo...
Bin Liu, H. V. Jagadish
SPAA
2010
ACM
15 years 2 months ago
Online capacity maximization in wireless networks
In this paper we study a dynamic version of capacity maximization in the physical model of wireless communication. In our model, requests for connections between pairs of points i...
Alexander Fanghänel, Sascha Geulen, Martin Ho...
BMCBI
2010
116views more  BMCBI 2010»
14 years 10 months ago
Optimization algorithms for functional deimmunization of therapeutic proteins
Background: To develop protein therapeutics from exogenous sources, it is necessary to mitigate the risks of eliciting an anti-biotherapeutic immune response. A key aspect of the ...
Andrew S. Parker, Wei Zheng, Karl E. Griswold, Chr...
ICC
2008
IEEE
115views Communications» more  ICC 2008»
15 years 4 months ago
Oblivious Routing for Wireless Mesh Networks
—Wireless mesh networks have attracted increasing attention and deployment as a high-performance and low-cost solution to last-mile broadband Internet access. Traffic routing pl...
Jonathan Wellons, Yuan Xue