Sciweavers

385 search results - page 49 / 77
» A network flow based approach for network selection in dynam...
Sort
View
ISCC
2002
IEEE
101views Communications» more  ISCC 2002»
14 years 14 days ago
Partial path protection for WDM networks: end-to-end recovery using local failure information
In this paper, we propose a new protection scheme, which we term partial path protection (PPP), to select endto-end backup paths using local information about network failures. PP...
Hungjen Wang, Eytan Modiano, Muriel Médard
FLAIRS
2004
13 years 9 months ago
A Method Based on RBF-DDA Neural Networks for Improving Novelty Detection in Time Series
Novelty detection in time series is an important problem with application in different domains such as machine failure detection, fraud detection and auditing. An approach to this...
Adriano L. I. Oliveira, Fernando Buarque de Lima N...
WONS
2005
IEEE
14 years 1 months ago
Multipath Associativity Based Routing
Abstract:This paper introduces a series of new multipath routing protocols developed upon Associativity Based Routing (ABR) for wireless ad-hoc networks. ABR selects routes based o...
Patrick McCarthy, Dan Grigoras
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
13 years 11 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
CCS
2003
ACM
14 years 23 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves