Sciweavers

3707 search results - page 654 / 742
» Clustering by Pattern Similarity
Sort
View
ISCAPDCS
2004
13 years 11 months ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee
NLUCS
2004
13 years 11 months ago
A Text Mining Approach to Tracking Elements of Decision Making: a pilot study
Understanding rework, the causes of rework, and the relationship between issues, decisions and the associated actions, is crucial in minimizing the fundamental industrial problems ...
Caroline Chibelushi, Bernadette Sharp, Andy Salter
WAE
2001
222views Algorithms» more  WAE 2001»
13 years 11 months ago
An Experimental Study of Data Migration Algorithms
The data migration problem is the problem of computing a plan for moving data objects stored on devices in a network from one configuration to another. Load balancing or changing u...
Eric J. Anderson, Joseph Hall, Jason D. Hartline, ...
WSC
2004
13 years 11 months ago
Traffic Flow Management Modeling and Operational Complexity
Traffic Flow Management (TFM) actions are commonly used to mitigate capacity/demand imbalances within the National Airspace System (NAS). Modeling TFM events has proven challengin...
Brendan Patrick Hogan, Leonard A. Wojcik
MS
2003
13 years 11 months ago
Information-theoretic Competitive Learning
— In this paper, we propose a new supervised learning method whereby information is controlled by the associated cost in an intermediate layer, and in an output layer, errors bet...
Ryotaro Kamimura