Sciweavers

896 search results - page 143 / 180
» Improving the Use of Pseudo-Words for Evaluating Selectional...
Sort
View
CONEXT
2009
ACM
13 years 10 months ago
SWARM: the power of structure in community wireless mesh networks
Community wireless networks (CWNs) have been proposed to spread broadband network access to underprivileged, underprovisioned and remote areas. Research has focused on optimizing ...
Saumitra M. Das, Konstantina Papagiannaki, Suman B...
PPSN
2010
Springer
13 years 7 months ago
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Existing privacy-preserving evolutionary algorithms are limited to specific problems securing only cost function evaluation. This lack of functionality and security prevents thei...
Daniel Funke, Florian Kerschbaum
DAWAK
2009
Springer
14 years 3 months ago
Dynamic Clustering-Based Estimation of Missing Values in Mixed Type Data
The appropriate choice of a method for imputation of missing data becomes especially important when the fraction of missing values is large and the data are of mixed type. The prop...
Vadim V. Ayuyev, Joseph Jupin, Philip W. Harris, Z...
ESWS
2009
Springer
14 years 3 months ago
Benchmarking Fulltext Search Performance of RDF Stores
More and more applications use the RDF framework as their data model and RDF stores to index and retrieve their data. Many of these applications require both structured queries as ...
Enrico Minack, Wolf Siberski, Wolfgang Nejdl
DSN
2007
IEEE
14 years 3 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang