Sciweavers

5093 search results - page 998 / 1019
» How Real are Real Numbers
Sort
View
JSAC
2008
111views more  JSAC 2008»
13 years 7 months ago
Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks
Abstract--Applications involving the dissemination of information directly relevant to humans (e.g., service advertising, news spreading, environmental alerts) often rely on publis...
Paolo Costa, Cecilia Mascolo, Mirco Musolesi, Gian...
KAIS
2008
119views more  KAIS 2008»
13 years 7 months ago
An information-theoretic approach to quantitative association rule mining
Abstract. Quantitative Association Rule (QAR) mining has been recognized an influential research problem over the last decade due to the popularity of quantitative databases and th...
Yiping Ke, James Cheng, Wilfred Ng
JLP
2006
138views more  JLP 2006»
13 years 7 months ago
Algebraic-coalgebraic specification in CoCasl
We introduce CoCasl as a light-weight but expressive coalgebraic extension of the algebraic specification language Casl. CoCasl allows the nested combination of algebraic datatype...
Till Mossakowski, Lutz Schröder, Markus Rogge...
JSAC
2006
112views more  JSAC 2006»
13 years 7 months ago
Performance Optimizations for Deploying VoIP Services in Mesh Networks
In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same voice-over-Internet protocol (V...
Samrat Ganguly, Vishnu Navda, Kyungtae Kim, Anand ...
JSAC
2006
93views more  JSAC 2006»
13 years 7 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....