Sciweavers

2446 search results - page 228 / 490
» Characterizing the Performance of
Sort
View
HPDC
2002
IEEE
15 years 9 months ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
HAIS
2010
Springer
15 years 9 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
DSN
2000
IEEE
15 years 9 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
MOBICOM
1999
ACM
15 years 9 months ago
WTCP: A Reliable Transport Protocol for Wireless Wide-Area Networks
Wireless wide-area networks (WWANs) are characterized by very low and variable bandwidths, very high and variable delays, significant non-congestion related losses, asymmetric upl...
Prasun Sinha, Narayanan Venkitaraman, Raghupathy S...
GECCO
1999
Springer
133views Optimization» more  GECCO 1999»
15 years 9 months ago
Evolution of Goal-Directed Behavior from Limited Information in a Complex Environment
In this paper, we apply an evolutionary algorithm to learning behavior on a novel, interesting task to explore the general issue of learning e ective behaviors in a complex enviro...
Matthew R. Glickman, Katia P. Sycara