Sciweavers

1866 search results - page 323 / 374
» A graph-theoretic approach to distributed control over netwo...
Sort
View
AIME
2009
Springer
14 years 25 days ago
Data-Efficient Information-Theoretic Test Selection
We use the concept of conditional mutual information (MI) to approach problems involving the selection of variables in the area of medical diagnosis. Computing MI requires estimate...
Marianne Mueller, Rómer Rosales, Harald Ste...
ICSE
2004
IEEE-ACM
14 years 9 months ago
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Because it takes time and trust to establish agreement, traditional consensus-based architectural styles cannot safely accommodate resources that change faster than it takes to tr...
Rohit Khare, Richard N. Taylor
MATA
2004
Springer
101views Communications» more  MATA 2004»
14 years 2 months ago
Mobile Tourist Guide Services with Software Agents
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Juan Pavón, Juan M. Corchado, Jorge J. G&oa...
INFOCOM
2006
IEEE
14 years 2 months ago
Tunnel Vector: A New Routing Algorithm with Scalability
—Routing algorithms such as Distance Vector and Link States have the routing table size as ΩΩΩΩ (n), where n is the number of destination identifiers, thus providing only...
Cheng-Jia Lai, Richard R. Muntz
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
14 years 3 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...