Sciweavers

658 search results - page 130 / 132
» Evaluation of alternative presentation control techniques
Sort
View
SENSYS
2006
ACM
14 years 1 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
CCS
2006
ACM
13 years 11 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
APPROX
2010
Springer
168views Algorithms» more  APPROX 2010»
13 years 9 months ago
Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners
Abstract. Given a directed graph G = (V, E) and an integer k 1, a ktransitive-closure-spanner (k-TC-spanner) of G is a directed graph H = (V, EH ) that has (1) the same transitive...
Arnab Bhattacharyya, Elena Grigorescu, Madhav Jha,...
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 9 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
AIME
2009
Springer
13 years 8 months ago
Learning Approach to Analyze Tumour Heterogeneity in DCE-MRI Data During Anti-cancer Treatment
Abstract. The paper proposes a learning approach to support medical researchers in the context of in-vivo cancer imaging, and specifically in the analysis of Dynamic Contrast-Enhan...
Alessandro Daducci, Umberto Castellani, Marco Cris...