Sciweavers

897 search results - page 148 / 180
» Identity: How to name it, How to find it
Sort
View
CP
2006
Springer
15 years 3 months ago
Dynamic Symmetry Breaking Restarted
ion of a given partial assignment of values to variables. Compared with other symmetry breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodat...
Daniel S. Heller, Meinolf Sellmann
LISA
2003
15 years 1 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
14 years 9 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
97
Voted
VIS
2007
IEEE
80views Visualization» more  VIS 2007»
16 years 1 months ago
Topologically Clean Distance Fields
Analysis of materials obtained from physical simulations is important in the physical sciences. Our research was motivated by the need to investigate the properties of a simulated...
Attila G. Gyulassy, Mark A. Duchaineau, Vijay Na...
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
16 years 5 days ago
A multinomial clustering model for fast simulation of computer architecture designs
Computer architects utilize simulation tools to evaluate the merits of a new design feature. The time needed to adequately evaluate the tradeoffs associated with adding any new fe...
Kaushal Sanghai, Ting Su, Jennifer G. Dy, David R....