Sciweavers

5344 search results - page 181 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 9 months ago
TDM Emulation in Packet-Switched Networks
— Many network operators offer some type of tiered service, in which users may select only from a small set of service levels (tiers). In this work, we study the problem of desig...
George N. Rouskas, Nikhil Baradwaj
115
Voted
AIME
2007
Springer
15 years 9 months ago
Machine Learning Techniques for Decision Support in Anesthesia
Abstract. The growing availability of measurement devices in the operating room enables the collection of a huge amount of data about the state of the patient and the doctors’ pr...
Olivier Caelen, Gianluca Bontempi, Luc Barvais
ICDCSW
2006
IEEE
15 years 9 months ago
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health
— Healthcare and economic drivers have increased the desire to deploy systems for continuous monitoring of patients, both in hospital and outpatient settings. Such systems must o...
Stephen Strowes, Nagwa Badr, Steven Heeps, Emil Lu...
PROFES
2005
Springer
15 years 9 months ago
Measuring Similarity of Large Software Systems Based on Source Code Correspondence
Abstract. It is an important and intriguing issue to know the quantitative similarity of large software systems. In this paper, a similarity metric between two sets of source code ...
Tetsuo Yamamoto, Makoto Matsushita, Toshihiro Kami...
88
Voted
SIGOPSE
2004
ACM
15 years 8 months ago
Impeding attrition attacks in P2P systems
—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...