Sciweavers

3059 search results - page 605 / 612
» Information modeling for single sourcing
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 29 days ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
MLDM
2005
Springer
14 years 29 days ago
Multivariate Discretization by Recursive Supervised Bipartition of Graph
Abstract. In supervised learning, discretization of the continuous explanatory attributes enhances the accuracy of decision tree induction algorithms and naive Bayes classifier. M...
Sylvain Ferrandiz, Marc Boullé
SIGMETRICS
2004
ACM
108views Hardware» more  SIGMETRICS 2004»
14 years 27 days ago
Uncooperative congestion control
—Traditionally uncooperative rate control schemes have implied open loop protocols such as UDP, CBR. In this paper we show that closed loop uncooperative rate control schemes als...
Kartikeya Chandrayana, Shivkumar Kalyanaraman
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
14 years 27 days ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
ICCS
2004
Springer
14 years 26 days ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan