Sciweavers

1716 search results - page 268 / 344
» Proving Conditional Termination
Sort
View
105
Voted
DSRT
2003
IEEE
15 years 6 months ago
Performance Evaluation of the Managed Bandwidth Service with QoS Guarantees
This paper describes a solution to extend the Managed Bandwidth Service (MBS), which is provided on a backbone network using MPLS VPNs, to non-MPLS domains and also evaluates it. ...
Christos Bouras, Vaggelis Kapoulas, Dimitris Primp...
114
Voted
ICDM
2003
IEEE
126views Data Mining» more  ICDM 2003»
15 years 6 months ago
Mining Relevant Text from Unlabelled Documents
Automatic classification of documents is an important area of research with many applications in the fields of document searching, forensics and others. Methods to perform class...
Daniel Barbará, Carlotta Domeniconi, Ning K...
108
Voted
EPIA
2003
Springer
15 years 6 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...
115
Voted
EUROCRYPT
2003
Springer
15 years 6 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
88
Voted
DATE
2010
IEEE
166views Hardware» more  DATE 2010»
15 years 6 months ago
From transistors to MEMS: Throughput-aware power gating in CMOS circuits
—In this paper we study the effectiveness of two power gating methods – transistor switches and MEMS switches – in reducing the power consumption of a design with a certain t...
Michael B. Henry, Leyla Nazhandali