Sciweavers

11814 search results - page 2186 / 2363
» On Generalization by Neural Networks
Sort
View
FOCS
2008
IEEE
15 years 11 months ago
Algorithms for Single-Source Vertex Connectivity
In the Survivable Network Design Problem (SNDP) the goal is to find a minimum cost subset of edges that satisfies a given set of pairwise connectivity requirements among the ver...
Julia Chuzhoy, Sanjeev Khanna
NDSS
2008
IEEE
15 years 11 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
NDSS
2008
IEEE
15 years 11 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 10 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
ICCCN
2007
IEEE
15 years 10 months ago
Packet Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation
Abstract— Packet delay and bandwidth are two important metrics for measuring quality of service (QoS) of Internet services. Traditionally, packet delay differentiation and fair b...
Dennis Ippoliti, Xiaobo Zhou, Liqiang Zhang
« Prev « First page 2186 / 2363 Last » Next »