Sciweavers

1296 search results - page 81 / 260
» Multiplicative Background Risk
Sort
View
105
Voted
WWW
2010
ACM
15 years 6 months ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...
CONEXT
2008
ACM
15 years 2 months ago
DaVinci: dynamically adaptive virtual networks for a customized internet
Running multiple virtual networks, customized for different performance objectives, is a promising way to support diverse applications over a shared substrate. Despite being simpl...
Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee,...
92
Voted
TSMC
2002
102views more  TSMC 2002»
15 years 7 days ago
Modeling and analysis of air campaign resource allocation: a spatio-temporal decomposition approach
In this paper, we address the modeling and analysis issues associated with a generic theater level campaign where two adversaries pit their military resources against each other ov...
Debasish Ghose, M. Krichman, Jason L. Speyer, Jeff...
111
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
78
Voted
CDC
2010
IEEE
14 years 7 months ago
Cost-aware Bayesian sequential decision-making for domain search and object classification
This paper focuses on the development of a cost-aware Bayesian sequential decision-making strategy for the search and classification of multiple unknown objects over a given domain...
Yue Wang, Islam I. Hussein, Donald R. Brown, Richa...