Sciweavers

4488 search results - page 145 / 898
» Properties of NP-Complete Sets
Sort
View
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 3 months ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
SIGCOMM
2012
ACM
11 years 10 months ago
Multi-resource fair queueing for packet processing
Middleboxes are ubiquitous in today’s networks and perform a variety of important functions, including IDS, VPN, firewalling, and WAN optimization. These functions differ vastl...
Ali Ghodsi, Vyas Sekar, Matei Zaharia, Ion Stoica
AAAI
2012
11 years 10 months ago
Modeling Textual Cohesion for Event Extraction
Event extraction systems typically locate the role fillers for an event by analyzing sentences in isolation and identifying each role filler independently of the others. We argu...
Ruihong Huang, Ellen Riloff
IDA
2006
Springer
13 years 8 months ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...
INDOCRYPT
2005
Springer
14 years 1 months ago
On the Algebraic Immunity of Symmetric Boolean Functions
In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identify a set of lowest degree annihilators for symmetric functions and propose an efficient al...
An Braeken, Bart Preneel