Sciweavers

2625 search results - page 484 / 525
» Experiments on data fusion using headline information
Sort
View
CN
2007
80views more  CN 2007»
13 years 10 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
FIRSTMONDAY
2007
61views more  FIRSTMONDAY 2007»
13 years 10 months ago
Implementing openness: An international institutional perspective
The debate on “openness” has tended to focus on standard setting, software copyrights, patent policy and collaborative innovation models – large issues that evoke heated deb...
Sacha Wunsch-Vincent, Taylor Reynolds, Andrew Wyck...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 10 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
13 years 10 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
IVC
2007
176views more  IVC 2007»
13 years 10 months ago
Kernel-based distance metric learning for content-based image retrieval
ct 8 For a specific set of features chosen for representing images, the performance of a content-based image retrieval (CBIR) system 9 depends critically on the similarity or diss...
Hong Chang, Dit-Yan Yeung