Sciweavers

2057 search results - page 286 / 412
» From content distribution networks to content networks - iss...
Sort
View
BMCBI
2008
123views more  BMCBI 2008»
13 years 8 months ago
Validation of protein models by a neural network approach
Background: The development and improvement of reliable computational methods designed to evaluate the quality of protein models is relevant in the context of protein structure re...
Paolo Mereghetti, Maria Luisa Ganadu, Elena Papale...
AAMAS
2006
Springer
13 years 8 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
JMLR
2008
100views more  JMLR 2008»
13 years 8 months ago
Hit Miss Networks with Applications to Instance Selection
In supervised learning, a training set consisting of labeled instances is used by a learning algorithm for generating a model (classifier) that is subsequently employed for decidi...
Elena Marchiori
INFOCOM
2010
IEEE
13 years 6 months ago
Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management
Abstract—This paper investigates pricing of Internet connectivity services in the context of a monopoly ISP selling broadband access to consumers. We first study the optimal com...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 6 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...