Sciweavers

1737 search results - page 278 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
15 years 8 months ago
Combining partitions by probabilistic label aggregation
Data clustering represents an important tool in exploratory data analysis. The lack of objective criteria render model selection as well as the identification of robust solutions...
Tilman Lange, Joachim M. Buhmann
CSE
2009
IEEE
15 years 9 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
119
Voted
BROADNETS
2005
IEEE
15 years 8 months ago
Modeling and performance evaluation of ISCSI storage area networks
Abstract— This paper provides a concise modeling and performance evaluation of the iSCSI storage area network (SAN) architecture and protocol. SANs play a key role in business co...
Christoph M. Gauger, Martin Köhn, Sebastian G...
ISCC
2002
IEEE
135views Communications» more  ISCC 2002»
15 years 7 months ago
End-to-end versus explicit feedback measurement in 802.11 networks
Higher layer protocols in wireless networks need to dynamically adapt to observed network response. The common approach is that each session employs end-to-end monitoring to estim...
Manthos Kazantzidis, Mario Gerla
132
Voted
ICDAR
2005
IEEE
15 years 8 months ago
Skew Estimation for Scanned Documents from "Noises"
The vast majority of the published skew estimation methods for scanned document images are for textual documents. These methods are based on the principle that the skew angles can...
Bo Yuan, Chew Lim Tan