Sciweavers

10493 search results - page 1881 / 2099
» Dynamic Word Problems
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 8 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JMLR
2006
125views more  JMLR 2006»
13 years 8 months ago
Spam Filtering Using Statistical Data Compression Models
Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly attempts to evade fi...
Andrej Bratko, Gordon V. Cormack, Bogdan Filipic, ...
MAGS
2008
191views more  MAGS 2008»
13 years 8 months ago
Consensus ontologies in socially interacting MultiAgent systems
This paper presents approaches for building, managing, and evaluating consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent h...
Ergun Biçici
JSAC
2006
111views more  JSAC 2006»
13 years 8 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JSAC
2006
128views more  JSAC 2006»
13 years 8 months ago
Optimized Transmission for Fading Multiple-Access and Broadcast Channels With Multiple Antennas
In mobile wireless networks, dynamic allocation of resources such as transmit powers, bit-rates, and antenna beams based on the channel state information of mobile users is known t...
Mehdi Mohseni, Rui Zhang, John M. Cioffi
« Prev « First page 1881 / 2099 Last » Next »