Sciweavers

848 search results - page 116 / 170
» Randomness and the linear degrees of computability
Sort
View
ASMTA
2009
Springer
92views Mathematics» more  ASMTA 2009»
15 years 3 months ago
Comparison of Multi-service Routing Strategies for IP Core Networks
Abstract. Service differentiation in IP core networks may be supported by dedicated path selection rules. This paper investigates the degree of service distinction achievable when ...
Ulf Jensen, Armin Heindl
CCS
2008
ACM
15 years 1 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
JIFS
2008
155views more  JIFS 2008»
14 years 11 months ago
Improving supervised learning performance by using fuzzy clustering method to select training data
The crucial issue in many classification applications is how to achieve the best possible classifier with a limited number of labeled data for training. Training data selection is ...
Donghai Guan, Weiwei Yuan, Young-Koo Lee, Andrey G...
WDAG
2010
Springer
233views Algorithms» more  WDAG 2010»
14 years 10 months ago
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Abstract. Since in general it is NP-hard to solve the minimum dominating set problem even approximatively, a lot of work has been dedicated to central and distributed approximation...
Christoph Lenzen, Roger Wattenhofer
ICASSP
2011
IEEE
14 years 3 months ago
Reconfigurable decoder architectures for Raptor codes
Decoder architectures for architecture-aware Raptor codes having regular message access-and-processing patterns are presented. Raptor codes are a class of concatenated codes compo...
Hady Zeineddine, Mohammad M. Mansour