Sciweavers

4526 search results - page 128 / 906
» Algorithmic problems related to the Internet
Sort
View
TEC
2010
173views more  TEC 2010»
14 years 11 months ago
Analysis of Computational Time of Simple Estimation of Distribution Algorithms
Estimation of distribution algorithms (EDAs) are widely used in stochastic optimization. Impressive experimental results have been reported in the literature. However, little work ...
Tianshi Chen, Ke Tang, Guoliang Chen, Xin Yao
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 8 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 8 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
PHSN
1996
15 years 5 months ago
Fully reliable multicast in heterogeneous environments
Multicast (1:N) is now supported by a number of networks and communication protocols. A problem in this context is how to provide fully reliable data transmission to the receiver ...
José Ferreira de Rezende, Andreas Mauthe, S...
WWW
2008
ACM
16 years 4 months ago
As we may perceive: finding the boundaries of compound documents on the web
This paper considers the problem of identifying on the Web compound documents (cDocs) ? groups of web pages that in aggregate constitute semantically coherent information entities...
Pavel Dmitriev