Sciweavers

1471 search results - page 252 / 295
» Word Importance Discrimination Using Context Information
Sort
View
131
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
133
Voted
IAT
2007
IEEE
15 years 5 months ago
Resource-Aware Update Policy for Highly Dynamic P2P Networks
As a user attention has become a precious resource, a special care has to be taken to reduce the time needed for answering queries in P2P networks. Existing solutions are usually ...
Dragan Milosevic, Jérôme Kunegis, Sah...
158
Voted
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
125
Voted
ASC
2006
15 years 5 months ago
A WAM implementation for flexible query answering
In [7] Maria I. Sessa extended the SLD resolution principle with the ability of performing approximate reasoning and flexible query answering. The operational mechanism of similar...
Pascual Julián Iranzo, Clemente Rubio-Manza...
137
Voted
ATVA
2010
Springer
284views Hardware» more  ATVA 2010»
15 years 4 months ago
YAGA: Automated Analysis of Quantitative Safety Specifications in Probabilistic B
Probabilistic B (pB) [2, 8] extends classical B [7] to incorporate probabilistic updates together with the specification of quantitative safety properties. As for classical B, prob...
Ukachukwu Ndukwu, A. K. McIver