Sciweavers

1150 search results - page 37 / 230
» Performance Evaluation and Improvement of Algorithmic Approa...
Sort
View
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
13 years 7 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
ACMSE
2004
ACM
14 years 1 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
IFIP12
2009
13 years 5 months ago
A Hybrid Approach for Improving Prediction Coverage of Collaborative Filtering
In this paper we present a hybrid filtering algorithm that attempts to deal with low prediction Coverage, a problem especially present in sparse datasets. We focus on Item HyCoV, a...
Manolis G. Vozalis, Angelos I. Markos, Konstantino...
ECAI
2010
Springer
13 years 5 months ago
A Hybrid Continuous Max-Sum Algorithm for Decentralised Coordination
Abstract. In this paper we tackle the problem of coordinating multiple decentralised agents with continuous state variables. Specifically we propose a hybrid approach, which combin...
Thomas Voice, Ruben Stranders, Alex Rogers, Nichol...