Sciweavers

680 search results - page 40 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
USS
2008
13 years 11 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 8 months ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler
VTC
2006
IEEE
109views Communications» more  VTC 2006»
14 years 2 months ago
Utilization of an Indoor DAS for Repeater Deployment in WCDMA
—The aim of this paper is to assess the applicability of a repeater connected to a distributed antenna system for improving indoor capacity in UMTS radio network. A guarantee of ...
Jakub Borkowski, Jarno Niemela, Tero Isotalo, Panu...
IEEECIT
2010
IEEE
13 years 6 months ago
The Research on Teaching Method of Basics Course of Computer based on Cluster Analysis
Due to the difference between rural and urban and regional disparity of computer basic education produced at their middle school period, computer application level of the freshmen ...
ZhiXin Tie, Rong Jin, Hong Zhuang, Zhaoqing Wang
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
14 years 10 months ago
Skippy: Enabling Long-Lived Snapshots of the Long-Lived Past
Decreasing disk costs have made it practical to retain longlived snapshots, enabling new applications that analyze past states and infer about future states. Current approaches of...
Ross Shaull, Liuba Shrira, Hao Xu