Sciweavers

1691 search results - page 277 / 339
» Restricted subset selection
Sort
View
VLDB
2005
ACM
118views Database» more  VLDB 2005»
15 years 8 months ago
Mining Compressed Frequent-Pattern Sets
A major challenge in frequent-pattern mining is the sheer size of its mining results. In many cases, a high min sup threshold may discover only commonsense patterns but a low one ...
Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng
ASIASIM
2004
Springer
15 years 8 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
138
Voted
ISCIS
2004
Springer
15 years 8 months ago
Multicast Routing for Ad Hoc Networks with a Multiclass Scheme for Quality of Service
As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Kaan Bür, Cem Ersoy
133
Voted
MMB
2004
Springer
128views Communications» more  MMB 2004»
15 years 8 months ago
Coexistence of Various Topology Aggregation Methods in a Hierarchical Network
Quality of Service (QoS) routing methods are expected to replace existing routing protocols in future QoS-based data networks. QoS routing allows the selection of feasible paths f...
Karol Kowalik, Martin Collier
PET
2004
Springer
15 years 8 months ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...