Sciweavers

12697 search results - page 2496 / 2540
» Call for Papers
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
—Online advertising is a rapidly growing industry currently dominated by the search engine ’giant’ Google. In an attempt to tap into this huge market, Internet Service Provid...
Gabriel Maciá-Fernández, Yong Wang, ...
INFOCOM
2010
IEEE
13 years 6 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
TFS
2008
153views more  TFS 2008»
13 years 6 months ago
Encoding Words Into Interval Type-2 Fuzzy Sets Using an Interval Approach
This paper presents a very practical type-2-fuzzistics methodology for obtaining interval type-2 fuzzy set (IT2 FS) models for words, one that is called an interval approach (IA). ...
Feilong Liu, Jerry M. Mendel
JCO
2010
67views more  JCO 2010»
13 years 6 months ago
Galaxy cutsets in graphs
Given a network G = (V, E), we say that a subset of vertices S ⊆ V has radius r if it is spanned by a tree of depth at most r. We are interested in determining whether G has a cu...
Nicolas Sonnerat, Adrian Vetta
JFP
2010
107views more  JFP 2010»
13 years 6 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
« Prev « First page 2496 / 2540 Last » Next »