Sciweavers

20197 search results - page 3945 / 4040
» Comparing Computational Power
Sort
View
SIGMETRICS
2003
ACM
165views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
A hybrid systems modeling framework for fast and accurate simulation of data communication networks
In this paper we present a general hybrid systems modeling framework to describe the flow of traffic in communication networks. To characterize network behavior, these models use...
Stephan Bohacek, João P. Hespanha, Junsoo L...
WPES
2003
ACM
14 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
14 years 2 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
ADC
2003
Springer
182views Database» more  ADC 2003»
14 years 2 months ago
CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth
Discovering association rules that identify relationships among sets of items is an important problem in data mining. Finding frequent item sets is computationally the most expens...
Yudho Giri Sucahyo, Raj P. Gopalan
CIKM
2003
Springer
14 years 2 months ago
Visual structures for image browsing
Content-Based Image Retrieval (CBIR) presents several challenges and has been subject to extensive research from many domains, such as image processing or database systems. Databa...
Ricardo da Silva Torres, Celmar G. Silva, Claudia ...
« Prev « First page 3945 / 4040 Last » Next »