Sciweavers

3341 search results - page 557 / 669
» On Bounded Queries and Approximation
Sort
View
INFOCOM
2003
IEEE
15 years 10 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley
151
Voted
ICALP
2003
Springer
15 years 10 months ago
Degree Distribution of the FKP Network Model
Recently, Fabrikant, Koutsoupias and Papadimitriou [7] introduced a natural and beautifully simple model of network growth involving a trade-off between geometric and network obje...
Noam Berger, Béla Bollobás, Christia...
ISMIS
2003
Springer
15 years 10 months ago
Classifying Document Titles Based on Information Inference
We propose an intelligent document title classification agent based on a theory of information inference. The information is represented as vectorial spaces computed by a cognitive...
Dawei Song, Peter Bruza, Zi Huang, Raymond Y. K. L...
CW
2002
IEEE
15 years 10 months ago
Free-Form Deformation with Automatically Generated Multiresolution Lattices
Developing intuitive and efficient methods for shape editing is one of the most important areas in computer graphics, and free-form deformation (FFD), which is one of such methods...
Yutaka Ono, Bing-Yu Chen, Tomoyuki Nishita, Jieqin...
ICPP
2002
IEEE
15 years 10 months ago
Optimal Video Replication and Placement on a Cluster of Video-on-Demand Servers
A cost-effective approach to building up scalable Videoon-Demand (VoD) servers is to couple a number of VoD servers together in a cluster. In this article, we study a crucial vide...
Xiaobo Zhou, Cheng-Zhong Xu