Sciweavers

1733 search results - page 177 / 347
» Digital data networks design using genetic algorithms
Sort
View
149
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
178
Voted
IDA
2008
Springer
15 years 3 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
228
Voted
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
16 years 3 months ago
GAMPS: compressing multi sensor data by grouping and amplitude scaling
We consider the problem of collectively approximating a set of sensor signals using the least amount of space so that any individual signal can be efficiently reconstructed within...
Sorabh Gandhi, Suman Nath, Subhash Suri, Jie Liu
142
Voted
IPPS
2002
IEEE
15 years 8 months ago
Parallel EST Clustering
Expressed sequence tags, abbreviated ESTs, are DNA fragments experimentally derived from expressed portions of genes. Clustering of ESTs is essential for gene recognition and unde...
Anantharaman Kalyanaraman, Srinivas Aluru, Suresh ...
163
Voted
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
15 years 8 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...