Sciweavers

566 search results - page 90 / 114
» A virtual class calculus
Sort
View
NOMS
2008
IEEE
14 years 2 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
WS
2006
ACM
14 years 1 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
MIR
2005
ACM
140views Multimedia» more  MIR 2005»
14 years 1 months ago
Multiple random walk and its application in content-based image retrieval
In this paper, we propose a transductive learning method for content-based image retrieval: Multiple Random Walk (MRW). Its basic idea is to construct two generative models by mea...
Jingrui He, Hanghang Tong, Mingjing Li, Wei-Ying M...
COMCOM
1999
164views more  COMCOM 1999»
13 years 7 months ago
Support QoS in IP over ATM
An integrated service internet running real-time and multimedia applications is rapidly becoming a reality. Meanwhile, ATM technology is appearing in the marketplace. It is an imp...
Gung-Chou Lai, Ruay Shiung Chang

Book
747views
15 years 4 months ago
Data Structures and Algorithms with Object-Oriented Design Patterns in C++
"This book is about the fundamentals of data structures and algorithms--the basic elements from which large and complex software artifacts are built. To develop a solid unders...
Bruno R. Preiss