Sciweavers

1058 search results - page 175 / 212
» It's Doomed; We Can Prove It
Sort
View
PUC
2008
113views more  PUC 2008»
13 years 9 months ago
Design and evaluation of systems to support interaction capture and retrieval
Although many recent systems have been built to support Information Capture and Retrieval (ICR), these have not generally been successful. This paper presents studies that evaluate...
Steve Whittaker, Simon Tucker, Kumutha Swampillai,...
AAAI
2008
14 years 7 days ago
A Theory of Expressiveness in Mechanisms
A key trend in (electronic) commerce is a demand for higher levels of expressiveness in the mechanisms that mediate interactions. We develop a theory that ties the expressiveness ...
Michael Benisch, Norman M. Sadeh, Tuomas Sandholm
INFOCOM
2007
IEEE
14 years 4 months ago
Multicast Scheduling in Cellular Data Networks
— Multicast is an efficient means of transmitting the same content to multiple receivers while minimizing network resource usage. Applications that can benefit from multicast s...
Hyungsuk Won, Han Cai, Do Young Eun, Katherine Guo...
ICDCS
2003
IEEE
14 years 3 months ago
Effective Delay Control for High Rate Heterogeneous Real-time Flows
This paper presents a new method to control the delay performance for high rate heterogeneous real-time traffic flows based on a novel traffic control algorithm which is a gene...
Weijia Jia, Hanxing Wang, Maoning Tang, Wei Zhao
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...