Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 4
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
4 results
|
|
sorted by
|
|
On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.135-148, ⟨10.1007/978-3-642-30045-5_11⟩
Conference papers
hal-01531139v1
|
||
|
Research on the RRB+ Tree for Resource Reservation10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.83-93, ⟨10.1007/978-3-642-40820-5_8⟩
Conference papers
hal-01513776v1
|
||
|
ServiceStore: A Peer-to-Peer Framework for QoS-aware Service CompositionIFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.190-199, ⟨10.1007/978-3-642-15672-4_17⟩
Conference papers
hal-01054991v1
|
||
|
Random Forests with a Steepend Gini-Index Split Function and Feature Coherence Injection2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.255-272, ⟨10.1007/978-3-030-45778-5_17⟩
Conference papers
hal-03266471v1
|