Sciweavers

1687 search results - page 225 / 338
» Which pointer analysis should I use
Sort
View
PAM
2005
Springer
15 years 10 months ago
Scalable Coordination Techniques for Distributed Network Monitoring
Abstract. Emerging network monitoring infrastructures capture packetlevel traces or keep per-flow statistics at a set of distributed vantage points. Today, distributed monitors in...
Manish R. Sharma, John W. Byers
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
15 years 9 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ICDM
2002
IEEE
162views Data Mining» more  ICDM 2002»
15 years 9 months ago
Phrase-based Document Similarity Based on an Index Graph Model
Document clustering techniques mostly rely on single term analysis of the document data set, such as the Vector Space Model. To better capture the structure of documents, the unde...
Khaled M. Hammouda, Mohamed S. Kamel
HICSS
2000
IEEE
129views Biometrics» more  HICSS 2000»
15 years 8 months ago
Customer Delivered Value in a Web-based Supermarket
This paper explores the marketing of daily consumer goods in a pilot Web-based supermarket, in which no regular customers existed from among 65 registered ones at the end of the p...
Helena Ahola, Harri Oinas-Kukkonen, Timo Koivum&au...
RTSS
1998
IEEE
15 years 8 months ago
Real-Time Scheduling in a Generic Fault-Tolerant Architecture
Previous ultra-dependable real-time computing architectures have been specialised to meet the requirements of a particular application domain. Over the last two years, a consortiu...
Andy J. Wellings, Ljerka Beus-Dukic, David Powell