Sciweavers

752 search results - page 123 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
14 years 9 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
PR
2008
141views more  PR 2008»
13 years 8 months ago
Robust and efficient multiclass SVM models for phrase pattern recognition
Phrase pattern recognition (phrase chunking) refers to automatic approaches for identifying predefined phrase structures in a stream of text. Support vector machines (SVMs)-based ...
Yu-Chieh Wu, Yue-Shi Lee, Jie-Chi Yang
WORDS
2005
IEEE
14 years 2 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
TCOM
2008
124views more  TCOM 2008»
13 years 8 months ago
Reliable adaptive modulation and interference mitigation for mobile radio slow frequency hopping channels
: Due to correlated fading in frequency hopping (FH) wireless communication systems, it is possible to predict the future channel state information (CSI) for one frequency based on...
Ming Lei, Alexandra Duel-Hallen, Hans Hallen
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...