Sciweavers

14558 search results - page 2826 / 2912
» Resources
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 4 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGIR
2008
ACM
15 years 4 months ago
Enhancing text clustering by leveraging Wikipedia semantics
Most traditional text clustering methods are based on "bag of words" (BOW) representation based on frequency statistics in a set of documents. BOW, however, ignores the ...
Jian Hu, Lujun Fang, Yang Cao, Hua-Jun Zeng, Hua L...
SIGMETRICS
2008
ACM
116views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Optimal sampling in state space models with applications to network monitoring
Advances in networking technology have enabled network engineers to use sampled data from routers to estimate network flow volumes and track them over time. However, low sampling ...
Harsh Singhal, George Michailidis
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Hierarchical routing over dynamic wireless networks
Dynamic networks are those where the topology changes over time and therefore efficient routes need to be maintained by frequent updates. Such updates could be costly in terms of ...
Dominique Tschopp, Suhas N. Diggavi, Matthias Gros...
IJFCS
2007
105views more  IJFCS 2007»
15 years 4 months ago
On the Existence of Lookahead Delegators for NFA
We investigate deterministically simulating (i.e., solving the membership problem for) nondeterministic finite automata (NFA), relying solely on the NFA’s resources (states and...
Bala Ravikumar, Nicolae Santean
« Prev « First page 2826 / 2912 Last » Next »