Sciweavers

6315 search results - page 1105 / 1263
» Approximating Solution Structure
Sort
View
133
Voted
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 6 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
136
Voted
APSEC
1996
IEEE
15 years 6 months ago
M-base : An Application Development Environment for End-user Computing based on Message Flow
Explosive increase in end-user computing on distributed systems requires that end-users develop application software by themselves. One solution is given as aformula of "adom...
Takeshi Chusho, Yuji Konishi, Masao Yoshioka
108
Voted
HT
1993
ACM
15 years 6 months ago
Links in Hypermedia: The Requirement for Context
Taking the concept of a link from hypertext and adding to it the rich collection of information formats found in multimedia systems provides an extension to hypertext that is ofte...
Lynda Hardman, Dick C. A. Bulterman, Guido van Ros...
PPSN
1992
Springer
15 years 6 months ago
Hyperplane Annealing and Activator-Inhibitor-Systems
This paper introduces a new optimization technique called hyperplane annealing. It is similar to the mean field annealing approach to combinatorial optimization. Both annealing te...
Thomas Laußermair
117
Voted
ACMICEC
2007
ACM
133views ECommerce» more  ACMICEC 2007»
15 years 6 months ago
Data acquisition and cost-effective predictive modeling: targeting offers for electronic commerce
Electronic commerce is revolutionizing the way we think about data modeling, by making it possible to integrate the processes of (costly) data acquisition and model induction. The...
Foster J. Provost, Prem Melville, Maytal Saar-Tsec...
« Prev « First page 1105 / 1263 Last » Next »