Sciweavers

551 search results - page 73 / 111
» Preventing existence
Sort
View
PKDD
2010
Springer
150views Data Mining» more  PKDD 2010»
14 years 10 months ago
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms
Given a contact network that changes over time (say, day vs night connectivity), and the SIS (susceptible/infected/susceptible, flu like) virus propagation model, what can we say ...
B. Aditya Prakash, Hanghang Tong, Nicholas Valler,...
TCOM
2010
197views more  TCOM 2010»
14 years 10 months ago
Power control for cooperative dynamic spectrum access networks with diverse QoS constraints
Dynamic spectrum access (DSA) is an integral part of cognitive radio technology aiming at efficient management of the available power and bandwidth resources. The present paper d...
Nikolaos Gatsis, Antonio G. Marqués, Georgi...
ESORICS
2010
Springer
14 years 9 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
IPPS
2010
IEEE
14 years 9 months ago
Adapting to NAT timeout values in P2P overlay networks
Abstract--Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. Keep-alive messages serve ...
Richard Price, Peter Tiño
NAACL
2010
14 years 9 months ago
Hitting the Right Paraphrases in Good Time
We present a random-walk-based approach to learning paraphrases from bilingual parallel corpora. The corpora are represented as a graph in which a node corresponds to a phrase, an...
Stanley Kok, Chris Brockett