Sciweavers

187 search results - page 19 / 38
» Utility-Based Role Exchange
Sort
View
WCNC
2008
IEEE
15 years 6 months ago
On Spatial Reuse and Capture in Ad Hoc Networks
—Neighbors of both the transmitter and the receiver must keep quiet in a 802.11 wireless network as it requires bidirectional exchange, i.e., nodes reverse their roles as transmi...
Naveen Santhapuri, Srihari Nelakuditi, Romit Roy C...
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 6 months ago
Temporal Analysis of Semantic Graphs Using ASALSAN
ASALSAN is a new algorithm for computing three-way DEDICOM, which is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or th...
Brett W. Bader, Richard A. Harshman, Tamara G. Kol...
SIGMOD
2000
ACM
236views Database» more  SIGMOD 2000»
15 years 4 months ago
XTRACT: A System for Extracting Document Type Descriptors from XML Documents
XML is rapidly emerging as the new standard for data representation and exchange on the Web. An XML document can be accompanied by a Document Type Descriptor (DTD) which plays the...
Minos N. Garofalakis, Aristides Gionis, Rajeev Ras...
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 1 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
GI
2010
Springer
14 years 10 months ago
A Method for Constructing Enterprise-wide Access Views on Business Objects
: Modern application landscapes consist of a multitude of inter-connected business applications exchanging data in manifold ways. These business applications are used by employees ...
Sabine Buckl, Florian Matthes, Sascha Roth, Christ...