Sciweavers

1201 search results - page 44 / 241
» Exact Analysis of Exact Change
Sort
View
116
Voted
COLCOM
2005
IEEE
15 years 9 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
127
Voted
SMI
2005
IEEE
140views Image Analysis» more  SMI 2005»
15 years 9 months ago
Interactive Implicit Modeling with Hierarchical Spatial Caching
Complex implicit CSG models can be represented hierarchically as a tree of nodes (the BlobTree) . However, current methods cannot be used to visualize changes made to these models...
Ryan Schmidt, Brian Wyvill, Eric Galin
124
Voted
COLT
1999
Springer
15 years 7 months ago
On a Generalized Notion of Mistake Bounds
This paper proposes the use of constructive ordinals as mistake bounds in the on-line learning model. This approach elegantly generalizes the applicability of the on-line mistake ...
Sanjay Jain, Arun Sharma
128
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
150
Voted
DAGSTUHL
2007
15 years 5 months ago
A Deeper Investigation of PageRank as a Function of the Damping Factor
PageRank is defined as the stationary state of a Markov chain. The chain is obtained by perturbing the transition matrix induced by a web graph with a damping factor α that spre...
Paolo Boldi, Massimo Santini, Sebastiano Vigna