Sciweavers

4112 search results - page 816 / 823
» Efficient Algorithms for the Spoonerism Problem
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
15 years 1 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
AAAI
1994
15 years 1 months ago
Incremental Recompilation of Knowledge
d Abstract) Goran Gogic l, Christos H. Papadimitriou', and Martha Sideri2 : Approximating a general formula from above and below by Horn formulas (its Horn envelope and Horn c...
Goran Gogic, Christos H. Papadimitriou, Martha Sid...
USENIX
1994
15 years 1 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
3DOR
2009
15 years 25 days ago
A 3D Shape Benchmark for Retrieval and Automatic Classification of Architectural Data
When drafting new buildings, architects make intensive use of existing 3D models including building elements, furnishing, and environment elements. These models are either directl...
Raoul Wessel, Ina Blümel, Reinhard Klein
ATAL
2010
Springer
15 years 24 days ago
A logic-based representation for coalitional games with externalities
We consider the issue of representing coalitional games in multiagent systems that exhibit externalities from coalition formation, i.e., systems in which the gain from forming a c...
Tomasz P. Michalak, Dorota Marciniak, Marcin Szamo...