• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 12,693
Next 10 →

scenario specific routing

by R. P. Bosman, J. J. Lukkien, P. H. F. M. Verhoeven
"... Using content-based addresses as a programming construct for ..."
Abstract - Add to MetaCart
Using content-based addresses as a programming construct for

Privacy Preserving Data Mining

by Yehuda Lindell, Benny Pinkas - JOURNAL OF CRYPTOLOGY , 2000
"... In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Our work is motivated b ..."
Abstract - Cited by 525 (9 self) - Add to MetaCart
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Our work is motivated

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments

A Bayesian approach to filtering junk E-mail

by Mehran Sahami, Susan Dumais, David Heckerman, Eric Horvitz - PAPERS FROM THE 1998 WORKSHOP, AAAI , 1998
"... In addressing the growing problem of junk E-mail on the Internet, we examine methods for the automated construction of filters to eliminate such unwanted messages from a user’s mail stream. By casting this problem in a decision theoretic framework, we are able to make use of probabilistic learning m ..."
Abstract - Cited by 545 (6 self) - Add to MetaCart
methods in conjunction with a notion of differential misclassification cost to produce filters Which are especially appropriate for the nuances of this task. While this may appear, at first, to be a straight-forward text classification problem, we show that by considering domain-specific features

A Knowledge-based Approach for Retrieving Scenario-specific

by Wesley W. Chu, Zhenyu Liu, Wenlei Mao, Qinghua Zou - Medical Text Documents, Control Engineering Practice (CEP), Special Section on Biomedical Control , 2005
"... Medical free-text queries often share the same scenario. A scenario represents a repeating task in healthcare. For example, a specific scenario is searching for treatment methods for a specific dis-ease, where “treatment ” is a term indicating the scenario. To support scenario-specific retrieval, in ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Medical free-text queries often share the same scenario. A scenario represents a repeating task in healthcare. For example, a specific scenario is searching for treatment methods for a specific dis-ease, where “treatment ” is a term indicating the scenario. To support scenario-specific retrieval

A group mobility model for ad hoc wireless networks

by Xiaoyan Hong, Mario Gerla, Guangyu Pei, Ching-chuan Chiang , 1999
"... In this paper, we present a survey of various mobility models in both cellular networks and multi-hop networks. We show that group motion occurs frequently in ad hoc networks, and introduce a novel group mobility model- Reference Point Group Mobility (RPGM)- to represent the relationship among mobil ..."
Abstract - Cited by 461 (27 self) - Add to MetaCart
of a specific network protocol or application. To this end, we have applied our RPGM model to two different network protocol scenarios, clustering and routing, and have evaluated network performance under different mobility patterns and for different protocol implementations. As expected, the results

MOSAIK – SCALABLE SMART GRID SCENARIO SPECIFICATION

by C. Laroque, J. Himmelspach, R. Pasupathy, O. Rose, A. M. Uhrmacher, Steffen Schütte, Michael Sonnenschein
"... The development of control strategies for the Smart Grid, the future electricity grid, relies heavily on modeling and simulation for being able to evaluate and optimize these strategies in a cost efficient, secure and timely way. To generate sound simulation results, validated and established simula ..."
Abstract - Add to MetaCart
simulation models have to be used. If these models are not implemented using the same technology, the composition of simulation models is an interesting approach. We developed a composition framework called mosaik, which allows to specify, compose and simulate Smart Grid scenarios based on the reuse

scenario-specific retrieval of medical free text

by Zhenyu Liu, Wesley W. Chu , 2007
"... Knowledge-based query expansion to support ..."
Abstract - Add to MetaCart
Knowledge-based query expansion to support

LSCs: Breathing Life into Message Sequence Charts

by Werner Damm, David Harel , 2001
"... While message sequence charts (MSCs) are widely used in industry to document the interworking of processes or objects, they are expressively weak, being based on the modest semantic notion of a partial ordering of events as defined, e.g., in the ITU standard. A highly expressive and rigorously defin ..."
Abstract - Cited by 444 (71 self) - Add to MetaCart
defined MSC language is a must for serious, semantically meaningful tool support for use-cases and scenarios. It is also a prerequisite to addressing what we regard as one of the central problems in behavioral specification of systems: relating scenario-based inter-object specification to state

Information-Based Objective Functions for Active Data Selection

by David J.C. MacKay - Neural Computation
"... Learning can be made more efficient if we can actively select particularly salient data points. Within a Bayesian learning framework, objective functions are discussed which measure the expected informativeness of candidate measurements. Three alternative specifications of what we want to gain infor ..."
Abstract - Cited by 428 (4 self) - Add to MetaCart
Learning can be made more efficient if we can actively select particularly salient data points. Within a Bayesian learning framework, objective functions are discussed which measure the expected informativeness of candidate measurements. Three alternative specifications of what we want to gain
Next 10 →
Results 1 - 10 of 12,693
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University