Sciweavers

173 search results - page 9 / 35
» Aspect presence verification conditional on other aspects
Sort
View
ICNP
2005
IEEE
14 years 29 days ago
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems
Peer-to-peer (P2P) anonymous communication systems are vulnerable to free-riders, peers that use the system while providing little or no service to others and whose presence limit...
Daniel R. Figueiredo, Jonathan K. Shapiro, Donald ...
IJCNN
2006
IEEE
14 years 1 months ago
Some stability properties of dynamic neural networks with different time-scales
Abstract— Dynamic neural networks with different timescales include the aspects of fast and slow phenomenons. Some applications require that the equilibrium points of these netwo...
Alejandro Cruz Sandoval, Wen Yu, Xiaoou Li
COMCOM
2000
125views more  COMCOM 2000»
13 years 7 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
ECIR
2006
Springer
13 years 8 months ago
A Comparative Study of the Effectiveness of Search Result Presentation on the Web
Presentation of search results in Web-based information retrieval (IR) systems has been dominated by a textual form of information such as the title, snippet, URL, and/or file type...
Hideo Joho, Joemon M. Jose
ADMA
2006
Springer
121views Data Mining» more  ADMA 2006»
14 years 1 months ago
A New Polynomial Time Algorithm for Bayesian Network Structure Learning
We propose a new algorithm called SCD for learning the structure of a Bayesian network. The algorithm is a kind of constraintbased algorithm. By taking advantage of variable orderi...
Sanghack Lee, Jihoon Yang, Sungyong Park