Sciweavers

834 search results - page 143 / 167
» On the Choice of the Population Size
Sort
View
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 2 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
VL
2005
IEEE
113views Visual Languages» more  VL 2005»
14 years 2 months ago
Estimating the Numbers of End Users and End User Programmers
In 1995, Boehm predicted that by 2005, there would be “55 million performers” of “end user programming” in the United States. The original context and method which generat...
Christopher Scaffidi, Mary Shaw, Brad A. Myers
ISRR
2005
Springer
118views Robotics» more  ISRR 2005»
14 years 2 months ago
A Provably Consistent Method for Imposing Sparsity in Feature-Based SLAM Information Filters
An open problem in Simultaneous Localization and Mapping (SLAM) is the development of algorithms which scale with the size of the environment. A few promising methods exploit the ...
Matthew Walter, Ryan Eustice, John J. Leonard
SSPR
2004
Springer
14 years 1 months ago
Optimizing Classification Ensembles via a Genetic Algorithm for a Web-Based Educational System
Classification fusion combines multiple classifications of data into a single classification solution of greater accuracy. Feature extraction aims to reduce the computational cost ...
Behrouz Minaei-Bidgoli, Gerd Kortemeyer, William F...
CCS
2003
ACM
14 years 1 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...