Sciweavers

575 search results - page 97 / 115
» Robust Distributed Name Service
Sort
View
ARESEC
2011
76views more  ARESEC 2011»
13 years 11 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
AICT
2007
IEEE
180views Communications» more  AICT 2007»
15 years 6 months ago
BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic
Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid developm...
Karim Mohammed Rezaul, Vic Grout
ENGL
2008
111views more  ENGL 2008»
14 years 10 months ago
Frameworks of Process Improvement for Mobile Applications
Mobile application development belongs on the complicated, but quite regular software development environment that includes many different solutions possibilities in the developmen...
Haeng-Kon Kim
TNN
2010
234views Management» more  TNN 2010»
14 years 6 months ago
Novel maximum-margin training algorithms for supervised neural networks
This paper proposes three novel training methods, two of them based on the back-propagation approach and a third one based on information theory for Multilayer Perceptron (MLP) bin...
Oswaldo Ludwig, Urbano Nunes
CIKM
2011
Springer
13 years 11 months ago
Simultaneous joint and conditional modeling of documents tagged from two perspectives
This paper explores correspondence and mixture topic modeling of documents tagged from two different perspectives. There has been ongoing work in topic modeling of documents with...
Pradipto Das, Rohini K. Srihari, Yun Fu