Sciweavers

2455 search results - page 253 / 491
» Graphical abstract help
Sort
View
123
Voted
ICCCN
2008
IEEE
15 years 11 months ago
Publish/Subscribe Service in CAN-based P2P Networks: Dimension Mismatch and The Random Projection Approach
Abstract—CAN is a well-known DHT technique for contentbased P2P networks, where each node is assigned a zone in a virtual coordinate space to store the index of the data hashed i...
Duc A. Tran, Thinh Nguyen
IJCNN
2008
IEEE
15 years 11 months ago
Building meta-learning algorithms basing on search controlled by machine complexity
Abstract— Meta-learning helps us find solutions to computational intelligence (CI) challenges in automated way. Metalearning algorithm presented in this paper is universal and m...
Norbert Jankowski, Krzysztof Grabczewski
154
Voted
SECURWARE
2008
IEEE
15 years 11 months ago
Preventing Insider Information Leakage for Enterprises
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Imad M. Abbadi, Muntaha Alawneh
TPHOL
2008
IEEE
15 years 11 months ago
Formalizing a Framework for Dynamic Slicing of Program Dependence Graphs in Isabelle/HOL
Slicing is a widely-used technique with applications in e.g. compiler technology and software security. Thus verification of algorithms in these areas is often based on the correc...
Daniel Wasserrab, Andreas Lochbihler
WIMOB
2008
IEEE
15 years 11 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...