Sciweavers

6574 search results - page 1297 / 1315
» Current Signatures: Application
Sort
View
PVLDB
2010
91views more  PVLDB 2010»
13 years 6 months ago
Regret-Minimizing Representative Databases
We propose the k-representative regret minimization query (k-regret) as an operation to support multi-criteria decision making. Like top-k, the k-regret query assumes that users h...
Danupon Nanongkai, Atish Das Sarma, Ashwin Lall, R...
TCOM
2010
91views more  TCOM 2010»
13 years 6 months ago
Slot-wise maximum likelihood estimation of the tag population size in FSA protocols
Abstract—Framed Slotted Aloha (FSA) is a popular anticollision technique in state-of-the-art RF-ID systems, as in ISO/IEC CD 18000-6 for 900MHz or the EPCglobal HF Gen 2 draft fo...
Bastian Knerr, Martin Holzer 0002, Christoph Anger...
TPDS
2010
87views more  TPDS 2010»
13 years 6 months ago
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation
Abstract—In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This crea...
Minghong Lin, John C. S. Lui, Dah-Ming Chiu
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 6 months ago
Gaussian Process Structural Equation Models with Latent Variables
In a variety of disciplines such as social sciences, psychology, medicine and economics, the recorded data are considered to be noisy measurements of latent variables connected by...
Ricardo Silva
ACSAC
2010
IEEE
13 years 6 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
« Prev « First page 1297 / 1315 Last » Next »