Sciweavers

778 search results - page 149 / 156
» From Public Views to Private Views - Correctness-by-Design f...
Sort
View
INFOCOM
2008
IEEE
14 years 1 months ago
Queueing Analysis of Loss Systems with Variable Optical Delay Lines
—Recently, a new optical device called variable optical delay line (VODL) has been proposed in the literature. As suggested by its name, the delay of a VODL can be dynamically se...
Duan-Shin Lee, Cheng-Shang Chang, Jay Cheng, Horng...
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 1 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
KIVS
2005
Springer
14 years 26 days ago
Measuring Large Overlay Networks - The Overnet Example
Peer-to-peer overlay networks have grown significantly in size and sophistication over the last years. Meanwhile, distributed hash tables (DHT) provide efficient means to create g...
Kendy Kutzner, Thomas Fuhrmann
GIS
2006
ACM
14 years 8 months ago
Exploiting a page-level upper bound for multi-type nearest neighbor queries
Given a query point and a collection of spatial features, a multi-type nearest neighbor (MTNN) query finds the shortest tour for the query point such that only one instance of eac...
Xiaobin Ma, Shashi Shekhar, Hui Xiong, Pusheng Zha...
EDBT
2008
ACM
166views Database» more  EDBT 2008»
14 years 7 months ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...