Sciweavers

1075 search results - page 110 / 215
» Calculating the Number of Tunnels
Sort
View
IWCMC
2006
ACM
14 years 4 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
WOWMOM
2006
ACM
162views Multimedia» more  WOWMOM 2006»
14 years 4 months ago
Gauging VoIP Call Quality from 802.11 WLAN Resource Usage
In this paper we experimentally study the relationship between resource utilization in the wireless LAN and the quality of VoIP calls transmitted over the wireless medium. Specifi...
Miroslaw Narbutt, Mark Davis
CIS
2005
Springer
14 years 3 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
RSFDGRC
2005
Springer
110views Data Mining» more  RSFDGRC 2005»
14 years 3 months ago
A Rough Set Based Model to Rank the Importance of Association Rules
Abstract. Association rule algorithms often generate an excessive number of rules, many of which are not significant. It is difficult to determine which rules are more useful, int...
Jiye Li, Nick Cercone
GECCO
2004
Springer
107views Optimization» more  GECCO 2004»
14 years 3 months ago
Multiple Species Weighted Voting - A Genetics-Based Machine Learning System
Multiple Species Weighted Voting (MSWV) is a genetics-based machine learning (GBML) system with relatively few parameters that combines N two-class classifiers into an N -class cla...
Alexander F. Tulai, Franz Oppacher