Sciweavers

960 search results - page 48 / 192
» There's no Data like More Data
Sort
View
CRV
2008
IEEE
106views Robotics» more  CRV 2008»
14 years 3 months ago
Path Planning for Planetary Exploration
In this paper we present the work done at the Canadian Space Agency on the problem of planetary exploration. One of the main goals is the over-the-horizon navigation of a mobile r...
Ioannis M. Rekleitis, Jean-Luc Bedwani, Erick Dupu...
CCS
2007
ACM
14 years 3 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
PKDD
2004
Springer
90views Data Mining» more  PKDD 2004»
14 years 2 months ago
Shape and Size Regularization in Expectation Maximization and Fuzzy Clustering
The more sophisticated fuzzy clustering algorithms, like the Gustafson–Kessel algorithm [11] and the fuzzy maximum likelihood estimation (FMLE) algorithm [10] offer the possibil...
Christian Borgelt, Rudolf Kruse
SIGCOMM
1999
ACM
14 years 1 months ago
Using Pathchar to Estimate Internet Link Characteristics
We evaluate pathchar, a tool that infers the characteristics of links along an Internet path latency, bandwidth, queue delays. Looking at two example paths, we identify circumst...
Allen B. Downey
DPD
2002
66views more  DPD 2002»
13 years 8 months ago
A Reference Architecture for the Certification of E-Services in a Digital Government Infrastructure
Certifying the execution of a service is a critical issue for an e-government infrastructure. In fact being able to document that an e-service was actually carried out, given the l...
Franco Arcieri, Giovanna Melideo, Enrico Nardelli,...