Sciweavers

1456 search results - page 173 / 292
» Keeping encountered information
Sort
View
95
Voted
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 1 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
CORR
2008
Springer
123views Education» more  CORR 2008»
15 years 1 months ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler
AIEDAM
2006
89views more  AIEDAM 2006»
15 years 1 months ago
Design space exploration revisited
Design involves reasoning about descriptions of design artefacts, reasoning about design requirements and reasoning about design process objectives (such as keeping to deadlines an...
Pieter H. G. van Langen, Frances M. T. Brazier
GPEM
2006
117views more  GPEM 2006»
15 years 1 months ago
Introducing lateral thinking in search engines
Abstract. Too much information kills information. This common statement applies to huge databases, where state of the art search engines may retrieve hundreds of very similar docum...
Yann Landrin-Schweitzer, Pierre Collet, Evelyne Lu...
117
Voted
CORR
2007
Springer
92views Education» more  CORR 2007»
15 years 1 months ago
Revisiting the Issues On Netflow Sample and Export Performance
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics ...
Hamed Haddadi, Raul Landa, Miguel Rio, Saleem N. B...