Sciweavers

2370 search results - page 295 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
69
Voted
DSN
2000
IEEE
15 years 2 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
STOC
2000
ACM
55views Algorithms» more  STOC 2000»
15 years 2 months ago
Self-testing of universal and fault-tolerant sets of quantum gates
We consider the design of self-testers for quantum gates. A self-tester for the gates F 1, . . . , F m is a procedure that, given any gates G1, . . . , Gm, decides with high probab...
Wim van Dam, Frédéric Magniez, Miche...
104
Voted
MOBICOM
1999
ACM
15 years 2 months ago
WTCP: A Reliable Transport Protocol for Wireless Wide-Area Networks
Wireless wide-area networks (WWANs) are characterized by very low and variable bandwidths, very high and variable delays, significant non-congestion related losses, asymmetric upl...
Prasun Sinha, Narayanan Venkitaraman, Raghupathy S...
FOCS
1998
IEEE
15 years 2 months ago
Quantum Lower Bounds by Polynomials
We examine the number T of queries that a quantum network requires to compute several Boolean functions on f0;1gN in the black-box model. We show that, in the blackbox model, the ...
Robert Beals, Harry Buhrman, Richard Cleve, Michel...
97
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 2 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant