Sciweavers

349 search results - page 46 / 70
» A case for end system multicast
Sort
View
ICDCS
2006
IEEE
14 years 1 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
SMC
2007
IEEE
134views Control Systems» more  SMC 2007»
14 years 1 months ago
TCM masters miner for knowledge transfer
—Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much...
Xijin Tang, Nan Zhang, Zheng Wang
ICMAS
1998
13 years 9 months ago
A Market Protocol for Decentralized Task Allocation
We present a decentralized, asynchronous market protocol for allocating and scheduling tasks among agents that contend for scarce resources, constrained by a hierarchical task dep...
William E. Walsh, Michael P. Wellman
AIL
2000
78views more  AIL 2000»
13 years 7 months ago
Representation of formal dispute with a standing order
Computational dialectics is a relatively new field. It is, among others, concerned with the formal representation of argument and dispute. The goal is to suggest algorithms, proce...
Gerard Vreeswijk
SRDS
1998
IEEE
13 years 11 months ago
A Data Allocation Algorithm for Distributed Hypermedia Documents
A major cost in executing queries in a distributed database system is the data transfer cost incurred in transferring relations (fragments) accessed by a query from different site...
Siu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem