Sciweavers

774 search results - page 70 / 155
» Markov incremental constructions
Sort
View
CCS
2006
ACM
14 years 26 days ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
ICMCS
2006
IEEE
344views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Pattern Mining in Visual Concept Streams
Pattern mining algorithms are often much easier applied than quantitatively assessed. In this paper we address the pattern evaluation problem by looking at both the capability of ...
Lexing Xie, Shih-Fu Chang
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
14 years 3 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
IRI
2005
IEEE
14 years 2 months ago
Data integration for capital projects via community-specific conceptual representations
Although data integration has been a research subject for decades in the AEC (Architecture Engineering Construction) industry whose data is usually highly fragmented, nowadays we ...
Yimin Zhu, Mei-Ling Shyu, Shu-Ching Chen
IM
2007
13 years 9 months ago
Ranking Websites: A Probabilistic View
In this paper we suggest evaluating the importance of a website with the mean frequency of visiting the website for the Markov chain on the Internet Graph describing random surfi...
Ying Bao, Guang Feng, Tie-Yan Liu, Zhiming Ma, Yin...