Sciweavers

14515 search results - page 2852 / 2903
» Efficient Embedded Computing
Sort
View
120
Voted
ESORICS
2008
Springer
15 years 3 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
122
Voted
ALT
2010
Springer
15 years 3 months ago
Contrast Pattern Mining and Its Application for Building Robust Classifiers
: The ability to distinguish, differentiate and contrast between different data sets is a key objective in data mining. Such ability can assist domain experts to understand their d...
Kotagiri Ramamohanarao
IMC
2007
ACM
15 years 3 months ago
Quality-of-service class specific traffic matrices in ip/mpls networks
In this paper we consider the problem of determining traffic matrices for end-to-end demands in an IP/MPLS network that supports multiple quality of service (QoS) classes. More pr...
Stefan Schnitter, Franz Hartleb, Martin Horneffer
EMNLP
2008
15 years 3 months ago
Relative Rank Statistics for Dialog Analysis
We introduce the relative rank differential statistic which is a non-parametric approach to document and dialog analysis based on word frequency rank-statistics. We also present a...
Juan Huerta
ESANN
2008
15 years 3 months ago
Learning Inverse Dynamics: a Comparison
While it is well-known that model can enhance the control performance in terms of precision or energy efficiency, the practical application has often been limited by the complexiti...
Duy Nguyen-Tuong, Jan Peters, Matthias Seeger, Ber...
« Prev « First page 2852 / 2903 Last » Next »