Sciweavers

761 search results - page 136 / 153
» Concise and Consistent Naming
Sort
View
CIDM
2009
IEEE
13 years 11 months ago
Empirical comparison of graph classification algorithms
The graph classification problem is learning to classify separate, individual graphs in a graph database into two or more categories. A number of algorithms have been introduced fo...
Nikhil S. Ketkar, Lawrence B. Holder, Diane J. Coo...
ICDCS
2010
IEEE
13 years 11 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 11 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
SPIEVIP
2008
13 years 10 months ago
Adaptive methods of two-scale edge detection in post-enhancement visual pattern processing
Adaptive methods are defined and experimentally studied for a two-scale edge detection process that mimics human visual perception of edges and is inspired by the parvo-cellular (...
Zia-ur Rahman, Daniel J. Jobson, Glenn A. Woodell
ASIACRYPT
2008
Springer
13 years 9 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi