Sciweavers

31 search results - page 5 / 7
» Improved interconnect sharing by identity operation insertio...
Sort
View
AIMS
2009
Springer
14 years 6 days ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
SIGMOD
1999
ACM
122views Database» more  SIGMOD 1999»
13 years 12 months ago
BOAT-Optimistic Decision Tree Construction
Classification is an important data mining problem. Given a training database of records, each tagged with a class label, the goal of classification is to build a concise model ...
Johannes Gehrke, Venkatesh Ganti, Raghu Ramakrishn...
SMA
2008
ACM
119views Solid Modeling» more  SMA 2008»
13 years 7 months ago
Converting a tetrahedral mesh to a prism-tetrahedral hybrid mesh for FEM accuracy and efficiency
This paper presents a computational method for converting a tetrahedral mesh to a prism-tetrahedral hybrid mesh for improved solution accuracy and computational efficiency of fini...
Soji Yamakawa, Kenji Shimada
MICRO
2008
IEEE
139views Hardware» more  MICRO 2008»
14 years 1 months ago
Adaptive data compression for high-performance low-power on-chip networks
With the recent design shift towards increasing the number of processing elements in a chip, high-bandwidth support in on-chip interconnect is essential for low-latency communicat...
Yuho Jin, Ki Hwan Yum, Eun Jung Kim
JUCS
2010
164views more  JUCS 2010»
13 years 6 months ago
On Sustainability of Context-Aware Services Among Heterogeneous Smart Spaces
Abstract: Most of ambient intelligence studies have tried to employ inductive methods (e.g., data mining) to discover useful information and patterns from data streams on sensor ne...
Jason J. Jung