Sciweavers

2242 search results - page 405 / 449
» Using Simulation in Call Centers
Sort
View
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
15 years 10 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
15 years 10 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
CCS
2009
ACM
15 years 4 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
15 years 4 months ago
Data gathering tours for mobile robots
— We study a path planning problem which arises when multiple robots are used to gather data from stationary devices with wireless communication capabilities. Each device has a g...
Deepak Bhadauria, Volkan Isler
GLOBECOM
2008
IEEE
15 years 4 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan