Sciweavers

10435 search results - page 2053 / 2087
» Measuring system normality
Sort
View
WORM
2004
13 years 10 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
ICMAS
1998
13 years 10 months ago
Emergent Properties of a Market-based Digital Library with Strategic Agents
The University of Michigan Digital Library (UMDL) is an open system that allows third-parties to build and integrate their own profit-seeking agents into the marketplace of inform...
Sunju Park, Edmund H. Durfee, William P. Birmingha...
BILDMED
2009
128views Algorithms» more  BILDMED 2009»
13 years 9 months ago
Surface-Based Respiratory Motion Classification and Verification
To ensure precise tumor irradiation in radiotherapy a stable breathing pattern is mandatory as tumors are moving due to respiratory motion. Consequentially, irregularities of respi...
Kerstin Müller, Christian Schaller, Jochen Pe...
ATAL
2010
Springer
13 years 9 months ago
Enumeration and exact design of weighted voting games
In many multiagent settings, situations arise in which agents must collectively make decisions while not every agent is supposed to have an equal amount of influence in the outcom...
Bart de Keijzer, Tomas Klos, Yingqian Zhang
CLEF
2009
Springer
13 years 9 months ago
Batch Document Filtering Using Nearest Neighbor Algorithm
This paper describes the participation of LIG lab, in the batch filtering task for the INFILE (INformation FILtering Evaluation) campaign of CLEF 2009. As opposed to the online ta...
Ali Mustafa Qamar, Éric Gaussier, Nathalie ...
« Prev « First page 2053 / 2087 Last » Next »