Sciweavers

291 search results - page 31 / 59
» Bias and the limits of pooling
Sort
View

Publication
216views
14 years 1 months ago
Dynamic Matching with a Fall-Back Option
We study dynamic matching without money when one side of the market is dynamic with arrivals and de- partures and the other is static and agents have strict prefer- ences over a...
Sujit Gujar, David Parkes
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 21 days ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
IEAAIE
2000
Springer
14 years 2 days ago
Information Management and Process Improvement Using Data Mining Techniques
This paper describes a computer component manufacturing scenario which concentrates on the application of data mining techniques to improve information management and process impr...
W. M. Gibbons, Mervi Ranta, T. M. Scott, Martti M&...
CONEXT
2005
ACM
13 years 10 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati
ESWS
2008
Springer
13 years 10 months ago
Enhancing Workflow with a Semantic Description of Scientific Intent
Abstract. In the e-Science context, workflow technologies provide a problemsolving environment for researchers by facilitating the creation and execution of experiments from a pool...
Edoardo Pignotti, Peter Edwards, Alun D. Preece, N...