Sciweavers

899 search results - page 141 / 180
» On Wiretap Networks II
Sort
View
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
HT
2004
ACM
14 years 2 months ago
Dynamically growing hypertext collections
Many approaches have been pursued over the years to facilitate creating, organizing, and sharing collections of materials extracted from large information spaces. Little attention...
Pratik Dave, Paul Logasa Bogen II, Unmil Karadkar,...
COORDINATION
2004
Springer
14 years 2 months ago
On Calculi for Context-Aware Coordination
Abstract. Modern distributed computing demands unprecedented levels of dynamicity and reconfiguration. Mobile computing, peer-to-peer networks, computational grids, multiagent sys...
Pietro Braione, Gian Pietro Picco
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 2 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
NOSSDAV
2004
Springer
14 years 2 months ago
An adaptive multiple retransmission technique for continuous media streams
Retransmission can be used for loss recovery in continuous media applications but the number of retransmission attempts is bounded by the size of the playout buffer. For efficient...
Rishi Sinha, Christos Papadopoulos