Sciweavers

8080 search results - page 1497 / 1616
» From Computer Networks to Agent Networks
Sort
View
154
Voted
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 9 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
108
Voted
POLICY
2005
Springer
15 years 9 months ago
Automated Decomposition of Access Control Policies
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
129
Voted
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 9 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
151
Voted
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 9 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
101
Voted
DSOM
2005
Springer
15 years 9 months ago
Can Dynamic Provisioning and Rejuvenation Systems Coexist in Peace?
Dynamic provisioning systems change application capacity in order to use enough resources to accommodate current load. Rejuvenation systems detect/forecast software failures and te...
Raquel Vigolvino Lopes, Walfredo Cirne, Francisco ...
« Prev « First page 1497 / 1616 Last » Next »