Sciweavers

236 search results - page 7 / 48
» How Can Intra Correlation Be Exploited Better
Sort
View
ISDA
2008
IEEE
14 years 1 months ago
Improving VG-RAM WNN Multi-label Text Categorization via Label Correlation
In multi-label text databases one or more labels, or categories, can be assigned to a single document. In many such databases there can be correlation on the assignment of subsets...
Alberto Ferreira de Souza, Claudine Badue, Bruno Z...
MOBILIGHT
2010
13 years 5 months ago
Measuring the Closed-Loop Throughput of 2x2 HSDPA over TX Power and TX Antenna Spacing
Abstract. Mobile network operators demand small base station antennas and high physical layer throughputs. In the downlink, high physical layer throughputs can be achieved by explo...
Sebastian Caban, José Antonio García...
PAM
2005
Springer
14 years 25 days ago
Internet Routing Policies and Round-Trip-Times
Abstract. Round trip times (RTTs) play an important role in Internet measurements. In this paper, we explore some of the ways in which routing policies impact RTTs. In particular, ...
Han Zheng, Eng Keong Lua, Marcelo Pias, Timothy G....
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
SIGSOFT
2010
ACM
13 years 2 months ago
Path-based fault correlations
Although a number of automatic tools have been developed to detect faults, much of the diagnosis is still being done manually. To help with the diagnostic tasks, we formally intro...
Wei Le, Mary Lou Soffa