Sciweavers

1358 search results - page 105 / 272
» Diverse Firewall Design
Sort
View
KDD
2001
ACM
166views Data Mining» more  KDD 2001»
16 years 4 months ago
Generalized clustering, supervised learning, and data assignment
Clustering algorithms have become increasingly important in handling and analyzing data. Considerable work has been done in devising effective but increasingly specific clustering...
Annaka Kalton, Pat Langley, Kiri Wagstaff, Jungsoo...
SIGMOD
2007
ACM
111views Database» more  SIGMOD 2007»
16 years 4 months ago
Query relaxation using malleable schemas
In contrast to classical databases and IR systems, real-world information systems have to deal increasingly with very vague and diverse structures for information management and s...
Xuan Zhou, Julien Gaugaz, Wolf-Tilo Balke, Wolfgan...
DSN
2009
IEEE
15 years 11 months ago
Power supply induced common cause faults-experimental assessment of potential countermeasures
Fault-tolerant architectures based on physical replication of components are vulnerable to faults that cause the same effect in all replica. Short outages in a power supply shared...
Peter Tummeltshammer, Andreas Steininger
126
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Distributed Physical Carrier Sensing Adaptation Scheme in Cooperative MAP WLAN
Abstract— Recently a multiple access point (MAP) architecture is proposed for wireless local area networks (WLAN) to exploit the spatial diversity by permitting each user to asso...
Yao Hua, Qian Zhang, Zhisheng Niu
ICASSP
2009
IEEE
15 years 11 months ago
Visual saliency with side information
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated sideinformation, such as time, location, authorship, and...
Wei Jiang, Lexing Xie, Shih-Fu Chang