Sciweavers

92 search results - page 18 / 19
» Minimizing Expected Attacking Cost in Networks
Sort
View
TKDE
2011
266views more  TKDE 2011»
12 years 10 months ago
Continuous Monitoring of Distance Based Range Queries
Given a positive value r, a distance based range query returns the objects that lie within the distance r of the query location. In this paper, we focus on the distance based rang...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
JMLR
2006
96views more  JMLR 2006»
13 years 7 months ago
A Hierarchy of Support Vector Machines for Pattern Detection
We introduce a computational design for pattern detection based on a tree-structured network of support vector machines (SVMs). An SVM is associated with each cell in a recursive ...
Hichem Sahbi, Donald Geman
WSC
2001
13 years 8 months ago
Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
Peter Lendermann, Boon-Ping Gan, Leon F. McGinnis
CN
2006
112views more  CN 2006»
13 years 7 months ago
Optimal server allocations for streaming multimedia applications on the Internet
In this paper, we address the server selection problem for streaming applications on the Internet. The architecture we consider is similar to the content distribution networks con...
Padmavathi Mundur, Poorva Arankalle
NDSS
2006
IEEE
14 years 1 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....