Sciweavers

505 search results - page 47 / 101
» Message from General Co-Chairs
Sort
View
IMC
2007
ACM
13 years 11 months ago
Usage-based dhcp lease time optimization
The Dynamic Host Configuration Protocol (DHCP) is used to dynamically allocate address space to hosts on a local area network. Despite its widespread usage, few studies exist on ...
Manas Khadilkar, Nick Feamster, Matt Sanders, Russ...
AAAI
2006
13 years 11 months ago
Strong Mediated Equilibrium
Providing agents with strategies that will be robust against deviations by coalitions is central to the design of multi-agent agents. However, such strategies, captured by the not...
Dov Monderer, Moshe Tennenholtz
ISSA
2004
13 years 11 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
PARMA
2004
174views Database» more  PARMA 2004»
13 years 11 months ago
Finding Spatial Patterns in Network Data
Data on modern networks are massive and are applied in the area of monitoring and analyzing activities at the network element, network-wide, and customer and service levels for a h...
Roland Heilmann, Daniel A. Keim, Christian Panse, ...
SSWMC
2004
13 years 11 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp