Sciweavers

366 search results - page 35 / 74
» A Survey of Models and Design Methods for Self-organizing Ne...
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 11 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
TELETRAFFIC
2007
Springer
14 years 2 months ago
Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. In a wavelength-routed optical network...
Alicia Nicki Washington, Harry G. Perros
IAT
2007
IEEE
14 years 3 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
CCR
2007
69views more  CCR 2007»
13 years 8 months ago
The state of peer-to-peer simulators and simulations
In this paper, we discuss the current situation with respect to simulation usage in P2P research, testing the available P2P simulators against a proposed set of requirements, and ...
S. Naicken, B. Livingston, Anirban Basu, S. Rodhet...
APIN
1998
139views more  APIN 1998»
13 years 8 months ago
Evolutionary Learning of Modular Neural Networks with Genetic Programming
Evolutionary design of neural networks has shown a great potential as a powerful optimization tool. However, most evolutionary neural networks have not taken advantage of the fact ...
Sung-Bae Cho, Katsunori Shimohara