Sciweavers

2144 search results - page 152 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
118
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
Peer-to-Peer Traffic: From Measurements to Analysis
We report in this paper measurements from France Telecom commercial networks carrying traffic generated and received by ADSL and FTTH customers. By adopting a flowbased approach to...
Fabrice Guillemin, Catherine Rosenberg, Long Le, G...
91
Voted
PPSN
2010
Springer
14 years 8 months ago
An Analysis of the XOR Dynamic Problem Generator Based on the Dynamical System
In this paper, we use the exact model (or dynamical system approach) to describe the standard evolutionary algorithm (EA) as a discrete dynamical system for dynamic optimization pr...
Renato Tinós, Shengxiang Yang
93
Voted
COMPSEC
2004
115views more  COMPSEC 2004»
14 years 10 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
ICECCS
2007
IEEE
92views Hardware» more  ICECCS 2007»
15 years 2 months ago
A first approach to the closed-form specification and analysis of an autonomic control system
Control systems must increasingly be designed to involve collections of hardware and software components, both of which may evolve over the lifetime of the system, and which are e...
Simon Dobson, Eoin Bailey, Stephen Knox, Ross Shan...
99
Voted
ICWSM
2009
14 years 7 months ago
Analysis of Social Influence in Online Book Reviews
It has been widely recognized that online opinions constitute important informational sources for consumers and producers. The open nature of communication supported by social med...
Patty Sakunkoo, Nathan Sakunkoo