Sciweavers

5046 search results - page 988 / 1010
» Feature Selection from Huge Feature Sets
Sort
View
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 1 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
IDEAL
2003
Springer
14 years 1 months ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...
AGP
2010
IEEE
14 years 1 months ago
Constraint Logic Programming
Constraint Logic Programming (CLP) is one of the most successful branches of Logic Programming; it attracts the interest of theoreticians and practitioners, and it is currently use...
Marco Gavanelli, Francesca Rossi
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
14 years 1 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang
CIE
2010
Springer
14 years 1 months ago
Focusing in Asynchronous Games
Game semantics provides an interactive point of view on proofs, which enables one to describe precisely their dynamical behavior during cut elimination, by considering formulas as ...
Samuel Mimram