Sciweavers

208 search results - page 23 / 42
» Realization using the model existence theorem
Sort
View
CIKM
2009
Springer
14 years 8 months ago
Measuring system performance and topic discernment using generalized adaptive-weight mean
Standard approaches to evaluating and comparing information retrieval systems compute simple averages of performance statistics across individual topics to measure the overall sys...
Chung Tong Lee, Vishwa Vinay, Eduarda Mendes Rodri...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
14 years 10 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
INFOCOM
2012
IEEE
13 years 1 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
14 years 10 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker