Sciweavers

8810 search results - page 1725 / 1762
» Openness
Sort
View
SECON
2010
IEEE
14 years 9 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
SIGSOFT
2010
ACM
14 years 9 months ago
Locating need-to-translate constant strings in web applications
Software internationalization aims to make software accessible and usable by users all over the world. For a Java application that does not consider internationalization at the be...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
SISAP
2010
IEEE
259views Data Mining» more  SISAP 2010»
14 years 9 months ago
kNN based image classification relying on local feature similarity
In this paper, we propose a novel image classification approach, derived from the kNN classification strategy, that is particularly suited to be used when classifying images descr...
Giuseppe Amato, Fabrizio Falchi
SODA
2010
ACM
174views Algorithms» more  SODA 2010»
14 years 9 months ago
Differentially Private Combinatorial Optimization
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...
USS
2010
14 years 9 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
« Prev « First page 1725 / 1762 Last » Next »