Sciweavers

942 search results - page 112 / 189
» A mechanism design approach to the stabilization of networke...
Sort
View
HOTOS
1999
IEEE
14 years 1 months ago
ISTORE: Introspective Storage for Data-Intensive Network Services
Today's fast-growing data-intensive network services place heavy demands on the backend servers that support them. This paper introduces ISTORE, an intelligent server archite...
Aaron B. Brown, David L. Oppenheimer, Kimberly Kee...
IJAHUC
2008
80views more  IJAHUC 2008»
13 years 9 months ago
Performance evaluation of node density-based adaptive routing scheme for disruption tolerant networks
: Traditional ad hoc routing protocols do not work in intermittently connected networks since end-to-end paths may not exist in such networks. Hence, routing mechanisms that can wi...
Mooi Choo Chuah, Peng Yang
IROS
2008
IEEE
161views Robotics» more  IROS 2008»
14 years 3 months ago
Segmenting acoustic signal with articulatory movement using Recurrent Neural Network for phoneme acquisition
— This paper proposes a computational model for phoneme acquisition by infants. Human infants perceive speech sounds not as discrete phoneme sequences but as continuous acoustic ...
Hisashi Kanda, Tetsuya Ogata, Kazunori Komatani, H...
SECPERU
2006
IEEE
14 years 3 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
NDSS
2009
IEEE
14 years 4 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee