Sciweavers

2642 search results - page 183 / 529
» The development of Chez Scheme
Sort
View
94
Voted
IJNSEC
2007
95views more  IJNSEC 2007»
15 years 23 days ago
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
In this paper, the Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions (CONFIDANT) is evaluated in the presence of tampering. CO...
Adam J. Rocke, Ronald F. DeMara, Simon Foo
TCOM
2008
120views more  TCOM 2008»
15 years 23 days ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief
66
Voted
IOR
2007
58views more  IOR 2007»
15 years 23 days ago
Bounds, Heuristics, and Approximations for Distribution Systems
This paper develops simple approximate methods to analyze a two-stage stochastic distribution system consisting of one warehouse and multiple retailers. We consider local and cent...
Guillermo Gallego, Özalp Özer, Paul H. Z...
TKDE
2008
175views more  TKDE 2008»
15 years 22 days ago
Efficient Phrase-Based Document Similarity for Clustering
Phrase has been considered as a more informative feature term for improving the effectiveness of document clustering. In this paper, we propose a phrase-based document similarity t...
Hung Chim, Xiaotie Deng
114
Voted
JCM
2007
126views more  JCM 2007»
15 years 22 days ago
Design Concepts and First Implementations for 24 GHz Wireless Sensor Nodes
— This paper reviews proposed realization concepts and achievements of wireless sensor nodes and focuses on new developments in the 24 GHz frequency range. The relatively high fr...
Stefan von der Mark, Meik Huber, Georg Boeck