Sciweavers

5829 search results - page 1030 / 1166
» The Practice of Cluster Analysis
Sort
View
TKDE
2002
67views more  TKDE 2002»
15 years 3 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
OIR
2008
87views more  OIR 2008»
15 years 3 months ago
E-science and information services: a missing link in the context of digital libraries
: Purpose: This paper analysis if and how far Library and Information Services (LIS) are supporting E-Science and Grid-Computing projects funded by authorities in the EU and German...
Achim Osswald
ICFEM
2010
Springer
15 years 2 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
INFOCOM
2010
IEEE
15 years 2 months ago
UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding
—Since the inception of network coding in information theory, we have witnessed a sharp increase of research interest in its applications in communications and networking, where ...
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao
INFOCOM
2010
IEEE
15 years 2 months ago
Near-Optimal Power Control in Wireless Networks: A Potential Game Approach
—We study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. Our objective is to design a pow...
Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, ...
« Prev « First page 1030 / 1166 Last » Next »