Sciweavers

2135 search results - page 101 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
QEST
2010
IEEE
13 years 6 months ago
Transient Analysis of Generalised Semi-Markov Processes Using Transient Stochastic State Classes
The method of stochastic state classes approaches the analysis of Generalised Semi Markov Processes (GSMP) through symbolic derivation of probability density functions over Differe...
András Horváth, Lorenzo Ridi, Enrico...
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
14 years 2 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...
INFOCOM
2010
IEEE
13 years 6 months ago
A Systematic Approach for Evolving VLAN Designs
—Enterprise networks are large and complex, and their designs must be frequently altered to adapt to changing organizational needs. The process of redesigning and reconfiguring ...
Xin Sun, Yu-Wei Eric Sung, Sunil Krothapalli, Sanj...
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
14 years 2 months ago
Discovering Excitatory Networks from Discrete Event Streams with Applications to Neuronal Spike Train Analysis
—Mining temporal network models from discrete event streams is an important problem with applications in computational neuroscience, physical plant diagnostics, and human-compute...
Debprakash Patnaik, Srivatsan Laxman, Naren Ramakr...
CMS
2006
127views Communications» more  CMS 2006»
13 years 9 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis