Sciweavers

1846 search results - page 348 / 370
» Computational Model of Speech Understanding
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
Considerations for Sizing Buffers in Optical Packet Switched Networks
— Optical packet switches of the foreseeable future are expected to have severely limited buffering capability, since storage of optical signals remains a difficult and expensiv...
Arun Vishwanath, Vijay Sivaraman, George N. Rouska...
IPCCC
2007
IEEE
14 years 4 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 4 months ago
ACOhg: dealing with huge graphs
Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build s...
Enrique Alba, J. Francisco Chicano
TRIDENTCOM
2006
IEEE
14 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
PLDI
2005
ACM
14 years 3 months ago
Programming ad-hoc networks of mobile and resource-constrained devices
Ad-hoc networks of mobile devices such as smart phones and PDAs represent a new and exciting distributed system architecture. Building distributed applications on such an architec...
Yang Ni, Ulrich Kremer, Adrian Stere, Liviu Iftode