Sciweavers

5829 search results - page 983 / 1166
» The Practice of Cluster Analysis
Sort
View
115
Voted
GROUP
2003
ACM
15 years 10 months ago
Stimulating knowledge discovery and sharing
Most of the available knowledge management systems pay little attention to two important aspects: the need of supporting emerging communities of interest together with the officia...
Alessandra Agostini, Sara Albolino, Giorgio De Mic...
IMC
2003
ACM
15 years 10 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
MOBICOM
2003
ACM
15 years 9 months ago
Sound mobility models
Simulation has become an indispensable tool in the construction and evaluation of mobile systems. By using mobility models that describe constituent movement, one can explore larg...
Jungkeun Yoon, Mingyan Liu, Brian Noble
SAC
2003
ACM
15 years 9 months ago
Manpower Scheduling with Time Windows
In this paper, we propose a manpower allocation model with time windows which is of practical interest to serviceman scheduling operations. Specifically, this problem originates f...
Andrew Lim, Brian Rodrigues, Lei Song
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 9 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi