Sciweavers

2478 search results - page 165 / 496
» Message from the Chair
Sort
View
CSFW
2000
IEEE
15 years 9 months ago
Protocol Independence through Disjoint Encryption
One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a securi...
Joshua D. Guttman, F. Javier Thayer
INFOCOM
1997
IEEE
15 years 9 months ago
A Distributed Algorithm for Delay-Constrained Unicast Routing
In this paper, we study the NP-hard delay-constrained least-cost path problem. A solution to this problem is needed to provide real-time communication service to connection-orient...
Hussein F. Salama, Douglas S. Reeves, Yannis Vinio...
RULES
1993
Springer
133views Database» more  RULES 1993»
15 years 8 months ago
Activities in Object Bases
Objects are collected into an object base because of a presumed need for cooperation among them. In classical object bases the cooperation is based on synchronous, preplanned mess...
Peter C. Lockemann, Hans-Dirk Walter
CEAS
2007
Springer
15 years 8 months ago
Online Active Learning Methods for Fast Label-Efficient Spam Filtering
Active learning methods seek to reduce the number of labeled examples needed to train an effective classifier, and have natural appeal in spam filtering applications where trustwo...
D. Sculley
ICDCS
2010
IEEE
15 years 8 months ago
Publisher Placement Algorithms in Content-Based Publish/Subscribe
—Many publish/subscribe systems implement a policy for clients to join to their physically closest broker to minimize transmission delays incurred on the clients’ messages. How...
Alex King Yeung Cheung, Hans-Arno Jacobsen