Sciweavers

1316 search results - page 254 / 264
» A New Scheduling Algorithm for Servers
Sort
View
SPAA
2010
ACM
14 years 16 days ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
GECCO
2010
Springer
184views Optimization» more  GECCO 2010»
14 years 15 days ago
Transfer learning through indirect encoding
An important goal for the generative and developmental systems (GDS) community is to show that GDS approaches can compete with more mainstream approaches in machine learning (ML)....
Phillip Verbancsics, Kenneth O. Stanley
IPPS
1999
IEEE
13 years 12 months ago
Qos Control and Adaptation in Distributed Multimedia Systems
Presently, many distributed multimedia systems adapt to their changing environments and Quality of Service (QoS) requirements by exchanging control and feedback data between server...
Farid Naït-Abdesselam, Nazim Agoulmine
CCS
2007
ACM
13 years 11 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...