Sciweavers

669 search results - page 97 / 134
» critical 2005
Sort
View
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 3 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
PCI
2005
Springer
15 years 3 months ago
Reliable Transmission Using Intermediate Sink or Source Nodes in Sensor Networks
The main resarch in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most impo...
Bo-Hyung Lee, Hyung-Wook Yoon, Jongho Park, Min Yo...
PCI
2005
Springer
15 years 3 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
PCM
2005
Springer
131views Multimedia» more  PCM 2005»
15 years 3 months ago
A Cross-Resolution Leaky Prediction Scheme for In-Band Wavelet Video Coding with Spatial Scalability
—In most existing in-band wavelet video coding schemes, over-complete wavelet transform is used for the motion-compensated temporal filtering (MCTF) of each spatial subband. It ...
Dongdong Zhang, Jizheng Xu, Feng Wu, Wenjun Zhang,...
60
Voted
RAID
2005
Springer
15 years 3 months ago
Empirical Analysis of Rate Limiting Mechanisms
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting t...
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi W...