Sciweavers

512 search results - page 70 / 103
» Reducibility among equilibrium problems
Sort
View
CCS
2003
ACM
14 years 2 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
ISPW
2010
IEEE
14 years 2 months ago
How to Welcome Software Process Improvement and Avoid Resistance to Change
Pressures for more complex products, customer dissatisfaction and problems related to cost and schedule overruns increase the need for effective management response and for improve...
Daniela Cristina Cascini Peixoto, Vitor A. Batista...
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 2 months ago
A new method for finding generalized frequent itemsets in generalized association rule mining
Generalized association rule mining is an extension of traditional association rule mining to discover more informative rules, given a taxonomy. In this paper, we describe a forma...
Kritsada Sriphaew, Thanaruk Theeramunkong
MOBICOM
2009
ACM
14 years 2 months ago
Understanding cross-band interference in unsynchronized spectrum access
We consider the problem of cross-band interference when devices from the same or different networks share radio spectrum. Cross-band interference occurs when unsynchronized trans...
Wei Hou, Lei Yang, Lin Zhang, Xiuming Shan, Heathe...
INFOCOM
2000
IEEE
14 years 2 months ago
Adaptive Proportional Routing: A Localized QoS Routing Approach
Abstract—Most of the QoS routing schemes proposed so far require periodic exchange of QoS state information among routers, imposing both communication overhead on the network and...
Srihari Nelakuditi, Zhi-Li Zhang, Rose P. Tsang