Sciweavers

7475 search results - page 1485 / 1495
» Supporting use case based requirements engineering
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
15 years 10 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
15 years 10 months ago
Extracting key-substring-group features for text classification
In many text classification applications, it is appealing to take every document as a string of characters rather than a bag of words. Previous research studies in this area mostl...
Dell Zhang, Wee Sun Lee
MOBIHOC
2005
ACM
15 years 9 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ICNP
2009
IEEE
15 years 4 months ago
CUBS: Coordinated Upload Bandwidth Sharing in Residential Networks
— Millions of residential users are widely served by cable or DSL connections with modest upload bandwidth and relatively high download bandwidth. For the increasingly important ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
« Prev « First page 1485 / 1495 Last » Next »