Sciweavers

907 search results - page 169 / 182
» A Comparison of Genetic Network Models
Sort
View
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
STOC
2009
ACM
133views Algorithms» more  STOC 2009»
14 years 7 months ago
Near-perfect load balancing by randomized rounding
We consider and analyze a new algorithm for balancing indivisible loads on a distributed network with n processors. The aim is minimizing the discrepancy between the maximum and m...
Tobias Friedrich, Thomas Sauerwald
CLUSTER
2009
IEEE
14 years 1 months ago
Granules: A lightweight, streaming runtime for cloud computing with support, for Map-Reduce
— Cloud computing has gained significant traction in recent years. The Map-Reduce framework is currently the most dominant programming model in cloud computing settings. In this ...
Shrideep Pallickara, Jaliya Ekanayake, Geoffrey Fo...
FUZZIEEE
2007
IEEE
14 years 1 months ago
Self-Fuzzification Method According to Typicality Correlation for Classification on Tiny Data Sets
— This article presents a self-fuzzification method to enhance the settings of a Fuzzy Reasoning Classification adapted to the automated inspection of wooden boards. The supervis...
Emmanuel Schmitt, Vincent Bombardier, Patrick Char...
VTC
2007
IEEE
14 years 1 months ago
Packet Centric vs. Radio Centric Link Layer Approaches: A Quantitative Analysis
Abstract— A well-known concept to adapt the transmitted payload to the current channel capacity is to perform segmentation of the uncoded user payload. In [1], a new cross layera...
Francesco Rossetto, Michael Meyer, Michele Zorzi