Sciweavers

1201 search results - page 44 / 241
» Exact Analysis of Exact Change
Sort
View
COLCOM
2005
IEEE
14 years 1 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
SMI
2005
IEEE
140views Image Analysis» more  SMI 2005»
14 years 1 months ago
Interactive Implicit Modeling with Hierarchical Spatial Caching
Complex implicit CSG models can be represented hierarchically as a tree of nodes (the BlobTree) . However, current methods cannot be used to visualize changes made to these models...
Ryan Schmidt, Brian Wyvill, Eric Galin
COLT
1999
Springer
13 years 12 months ago
On a Generalized Notion of Mistake Bounds
This paper proposes the use of constructive ordinals as mistake bounds in the on-line learning model. This approach elegantly generalizes the applicability of the on-line mistake ...
Sanjay Jain, Arun Sharma
ACSAC
2004
IEEE
13 years 11 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
DAGSTUHL
2007
13 years 9 months ago
A Deeper Investigation of PageRank as a Function of the Damping Factor
PageRank is defined as the stationary state of a Markov chain. The chain is obtained by perturbing the transition matrix induced by a web graph with a damping factor α that spre...
Paolo Boldi, Massimo Santini, Sebastiano Vigna