Sciweavers

7318 search results - page 1368 / 1464
» Models of real-valued measurability
Sort
View
JMM2
2007
96views more  JMM2 2007»
14 years 10 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
JMS
2007
117views more  JMS 2007»
14 years 10 months ago
Closing Emergency Operating Rooms Improves Efficiency
Long waiting times for emergency operations increase a patient’s risk of postoperative complications and morbidity. Reserving Operating Room (OR) capacity is a common technique t...
Gerhard Wullink, Mark van Houdenhoven, Erwin W. Ha...
JPDC
2007
117views more  JPDC 2007»
14 years 10 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
TWC
2008
201views more  TWC 2008»
14 years 10 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
APIN
2004
116views more  APIN 2004»
14 years 9 months ago
Neural Learning from Unbalanced Data
This paper describes the result of our study on neural learning to solve the classification problems in which data is unbalanced and noisy. We conducted the study on three differen...
Yi Lu Murphey, Hong Guo, Lee A. Feldkamp
« Prev « First page 1368 / 1464 Last » Next »