Sciweavers

431 search results - page 60 / 87
» Failure or Success
Sort
View
137
Voted
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 9 months ago
Scalable Resilient Overlay Networks Using Destination-Guided Detouring
— Routing policies used in the Internet tend to be restrictive limiting communication between source-destination pairs to one route, when often better alternates exist. To avoid ...
Sameer Qazi, Tim Moors
131
Voted
ECML
2007
Springer
15 years 9 months ago
Statistical Debugging Using Latent Topic Models
Abstract. Statistical debugging uses machine learning to model program failures and help identify root causes of bugs. We approach this task using a novel Delta-Latent-Dirichlet-Al...
David Andrzejewski, Anne Mulhern, Ben Liblit, Xiao...
131
Voted
ESORICS
2007
Springer
15 years 9 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
123
Voted
GECCO
2007
Springer
156views Optimization» more  GECCO 2007»
15 years 9 months ago
Nonlinearity linkage detection for financial time series analysis
Standard detection algorithms for nonlinearity linkage fail when applied to typical problems in the analysis of financial time-series data. We explain how this failure arises whe...
Theodore Chiotis, Christopher D. Clack
117
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...