Sciweavers

13987 search results - page 103 / 2798
» The Two Guards Problem
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
126
Voted
DIS
2006
Springer
15 years 7 months ago
On Class Visualisation for High Dimensional Data: Exploring Scientific Data Sets
Parametric Embedding (PE) has recently been proposed as a general-purpose algorithm for class visualisation. It takes class posteriors produced by a mixture-based clustering algori...
Ata Kabán, Jianyong Sun, Somak Raychaudhury...
115
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith
149
Voted
DAWAK
2006
Springer
15 years 5 months ago
COBRA: Closed Sequential Pattern Mining Using Bi-phase Reduction Approach
Sequential pattern mining aims to find frequent patterns (guarded by a minimum support) in a database of sequences. As the support decreases the number of sequential patterns will...
Kuo-Yu Huang, Chia-Hui Chang, Jiun-Hung Tung, Chen...
SIGMETRICS
2002
ACM
118views Hardware» more  SIGMETRICS 2002»
15 years 2 months ago
Robust traffic engineering: game theoretic perspective
On-line routing algorithms deal with requests as they arrive without assuming any knowledge of the underlying process that generates the streams of requests. By contrast, off-line...
Vladimir Marbukh