Sciweavers

1500 search results - page 290 / 300
» The Importance of Data Collection for Modelling Contact Netw...
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
140
Voted
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
15 years 10 months ago
MBMS Power Planning in Macro and Micro Cell Environments
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresse...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
138
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Shaping Realistic Neuronal Morphologies: An Evolutionary Computation Method
— Neuronal morphology plays a crucial role in the information processing capabilities of neurons. Despite the importance of morphology for neural functionality, biological data i...
Ben Torben-Nielsen, Karl Tuyls, Eric O. Postma
135
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Optimizing Caching Policy for Loss Recovery in Reliable Multicast
— In reliable multicast, data packets can be cached at some nodes such as repair servers for future possible retransmission in loss recovery schemes. How to cache packets to opti...
Feng Xie, Gang Feng, Xun Yang
134
Voted
SIGIR
2006
ACM
15 years 9 months ago
Contextual search and name disambiguation in email using graphs
Similarity measures for text have historically been an important tool for solving information retrieval problems. In many interesting settings, however, documents are often closel...
Einat Minkov, William W. Cohen, Andrew Y. Ng