Sciweavers

797 search results - page 126 / 160
» Observing Success in the Pi-Calculus
Sort
View
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
15 years 10 months ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SIGMOD
2004
ACM
150views Database» more  SIGMOD 2004»
15 years 9 months ago
When one Sample is not Enough: Improving Text Database Selection Using Shrinkage
Database selection is an important step when searching over large numbers of distributed text databases. The database selection task relies on statistical summaries of the databas...
Panagiotis G. Ipeirotis, Luis Gravano
ICSE
2007
IEEE-ACM
15 years 9 months ago
A Future for Software Engineering?
This paper suggests the need for a software engineering research community conversation about the future that the community would like to have. The paper observes that the researc...
Leon J. Osterweil
MOBIHOC
2008
ACM
15 years 9 months ago
Delegation forwarding
Mobile opportunistic networks are characterized by unpredictable mobility, heterogeneity of contact rates and lack of global information. Successful delivery of messages at low co...
Vijay Erramilli, Mark Crovella, Augustin Chaintrea...