Sciweavers

1486 search results - page 172 / 298
» Firewall Rules Analysis
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 11 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ATAL
2007
Springer
15 years 10 months ago
Sequential Auctions in Uncertain Information Settings
This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncerta...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
MLDM
2007
Springer
15 years 10 months ago
Selection of Experts for the Design of Multiple Biometric Systems
Abstract. In the biometric field, different experts are combined to improve the system reliability, as in many application the performance attained by individual experts (i.e., d...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
ICDCSW
2006
IEEE
15 years 10 months ago
Interdomain Routing as Social Choice
Interdomain routing is essential to both the stability and efficiency of the global Internet. However, most previous studies focus only on stability, and only on a special class ...
Ronny Ramzi Dakdouk, Semih Salihoglu, Hao Wang, Ha...
SLIP
2006
ACM
15 years 10 months ago
Generation of design guarantees for interconnect matching
Manufacturable design requires matching of interconnects which have equal nominal dimensions. New design rules are projected to bring guarantee rules for interconnect matching. In...
Andrew B. Kahng, Rasit Onur Topaloglu