Sciweavers

912 search results - page 107 / 183
» Anomaly
Sort
View
EUROPAR
2004
Springer
14 years 2 months ago
Load Unbalance in k-ary n-Cube Networks
This paper studies the effect that HOL (Head-of-Line) blocking in the packet injection queue has on the performance of bidirectional k-ary ncubes, for values of k over a certain th...
José Miguel-Alonso, José A. Gregorio...
IEAAIE
2004
Springer
14 years 2 months ago
The Cognitive Controller: A Hybrid, Deliberative/Reactive Control Architecture for Autonomous Robots
Abstract. The Cognitive Controller (CoCo) is a new, three-tiered control architecture for autonomous agents that combines reactive and deliberative components. A behaviour-based re...
Faisal Qureshi, Demetri Terzopoulos, Ross Gillett
ACSAC
2003
IEEE
14 years 2 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
14 years 2 months ago
MILA - Multilevel Immune Learning Algorithm
The biological immune system is an intricate network of specialized tissues, organs, cells, and chemical molecules. T-cell-dependent humoral immune response is one of the complex i...
Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumd...
CCECE
2009
IEEE
14 years 2 months ago
Experimental validation of statistical algorithm for diagnosis of damage fault
A statistical algorithm was developed for the damage fault diagnosis and prognosis tool and the present work focuses on the experimental validation. The oxide scale growth experim...
Amar Kumar, Amiya Nayak, Alka Srivastava, Nita Goe...