Sciweavers

35419 search results - page 6956 / 7084
» How are we doing
Sort
View
158
Voted
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 3 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
COR
2007
163views more  COR 2007»
15 years 3 months ago
A general heuristic for vehicle routing problems
We present a unified heuristic, which is able to solve five different variants of the vehicle routing problem: the vehicle routing problem with time windows (VRPTW), the capacit...
David Pisinger, Stefan Ropke
JCIT
2008
103views more  JCIT 2008»
15 years 3 months ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
125
Voted
CORR
2007
Springer
123views Education» more  CORR 2007»
15 years 3 months ago
Channel Capacity Estimation using Free Probability Theory
—In many channel measurement applications, one needs to estimate some characteristics of the channels based on a limited set of measurements. This is mainly due to the highly tim...
Øyvind Ryan, Mérouane Debbah
129
Voted
CPC
2007
105views more  CPC 2007»
15 years 3 months ago
Packing Cliques in Graphs with Independence Number 2
Let G be a graph with no three independent vertices. How many edges of G can be packed with edge-disjoint copies of Kk? More specifically, let fk(n, m) be the largest integer t s...
Raphael Yuster
« Prev « First page 6956 / 7084 Last » Next »