Sciweavers

41938 search results - page 8355 / 8388
» Complex Systems Modeling
Sort
View
JCM
2006
101views more  JCM 2006»
13 years 9 months ago
On the Analysis of Mobility Mechanisms in Micro Mobile MPLS Access Networks
Abstract--One of the major challenges for the nextgeneration mobile systems is related to efficient mobility management issue. In this paper, we propose a new micromobility managem...
Rami Langar, Nizar Bouabdallah, Samir Tohmé
JEC
2006
100views more  JEC 2006»
13 years 9 months ago
RC-SIMD: Reconfigurable communication SIMD architecture for image processing applications
During the last two decades, Single Instruction Multiple Data (SIMD) processors have become important architectures in embedded systems for image processing applications. The main ...
Hamed Fatemi, Bart Mesman, Henk Corporaal, Twan Ba...
JMLR
2006
124views more  JMLR 2006»
13 years 9 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
MAGS
2008
104views more  MAGS 2008»
13 years 9 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
JPDC
2006
253views more  JPDC 2006»
13 years 9 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
« Prev « First page 8355 / 8388 Last » Next »