Sciweavers

4138 search results - page 704 / 828
» Design and implementation of a network simulation system
Sort
View
RAID
2004
Springer
15 years 9 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
EAAI
2006
75views more  EAAI 2006»
15 years 4 months ago
Multi-agent framework based on smart sensors/actuators for machine tools control and monitoring
Throughout the history, the evolutions of the requirements for manufacturing equipments have depended on the changes in the customers' demands. Among the present trends in th...
Xavier Desforges, Bernard Archimède
ANTSW
2010
Springer
15 years 2 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 10 months ago
Reduced-Complexity Cluster Modelling for the 3GPP Channel Model
—The realistic performance of a multi-input multi-output (MIMO) communication system depends strongly on the spatial correlation properties introduced by clustering in the propag...
Hui Xiao, Alister G. Burr, Rodrigo C. de Lamare
COMCOM
2004
98views more  COMCOM 2004»
15 years 4 months ago
Proactive resource provisioning
Allocating resources in networks to QoS flows may require undesirable delays or costs. We consider a dynamic Service Level Agreement (SLA) negotiation scheme between peer autonomo...
Eric Chi, Michael Fu, Jean C. Walrand