Sciweavers

16844 search results - page 3281 / 3369
» How to Design Programs
Sort
View
RAID
2005
Springer
15 years 8 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
114
Voted
RULEML
2005
Springer
15 years 8 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof
UML
2005
Springer
15 years 8 months ago
Reliability Prediction in Model-Driven Development
Abstract. Evaluating the implications of an architecture design early in the software development lifecycle is important in order to reduce costs of development. Reliability is an ...
Genaína Nunes Rodrigues, David S. Rosenblum...
135
Voted
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 8 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu
141
Voted
VLDB
2005
ACM
180views Database» more  VLDB 2005»
15 years 8 months ago
Cache-conscious Frequent Pattern Mining on a Modern Processor
In this paper, we examine the performance of frequent pattern mining algorithms on a modern processor. A detailed performance study reveals that even the best frequent pattern min...
Amol Ghoting, Gregory Buehrer, Srinivasan Parthasa...
« Prev « First page 3281 / 3369 Last » Next »