Sciweavers

1809 search results - page 102 / 362
» Weakly Computable Real Numbers
Sort
View
ECSQARU
2009
Springer
15 years 10 months ago
Complexity and Cautiousness Results for Reasoning from Partially Preordered Belief Bases
Partially preordered belief bases are very convenient for an efficient representation of incomplete knowledge. They offer flexibility and avoid to compare unrelated pieces of inf...
Salem Benferhat, Safa Yahi
ICCS
2007
Springer
15 years 10 months ago
Pushing Frequency Constraint to Utility Mining Model
Traditional association rules mining (ARM) only concerns the frequency of itemsets, which may not bring large amount of profit. Utility mining only focuses on itemsets with high ut...
Jing Wang, Ying Liu, Lin Zhou, Yong Shi, Xingquan ...
P2P
2005
IEEE
15 years 9 months ago
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks
A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect–they allow some users to ch...
MyungJoo Ham, Gul Agha
ADHOCNOW
2004
Springer
15 years 9 months ago
Range-Free Ranking in Sensors Networks and Its Applications to Localization
We address the question of finding sensors’ coordinates, or at least an approximation of them, when the sensors’ abilities are very weak. In a d dimensional space, we define ...
Zvi Lotker, Marc Martinez de Albeniz, Stephane Per...
INFOCOM
1996
IEEE
15 years 8 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee