Sciweavers

1342 search results - page 122 / 269
» Effectivity and effective continuity of multifunctions
Sort
View
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 3 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
GLOBECOM
2007
IEEE
14 years 3 months ago
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
— Static replicas have been proven useful in providing fault tolerance and load balancing, but they may not provide enough assurance on the continuous availability of missioncrit...
Chin-Tser Huang, Prasanth Kalakota, Alexander B. A...
ATAL
2005
Springer
14 years 2 months ago
Multi-agent reward analysis for learning in noisy domains
In many multi agent learning problems, it is difficult to determine, a priori, the agent reward structure that will lead to good performance. This problem is particularly pronoun...
Adrian K. Agogino, Kagan Tumer
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
14 years 2 months ago
Generalized benchmark generation for dynamic combinatorial problems
Several general purpose benchmark generators are now available in the literature. They are convenient tools in dynamic continuous optimization as they can produce test instances w...
Abdulnasser Younes, Paul H. Calamai, Otman A. Basi...
CSB
2003
IEEE
150views Bioinformatics» more  CSB 2003»
14 years 2 months ago
Algorithms for Bounded-Error Correlation of High Dimensional Data in Microarray Experiments
The problem of clustering continuous valued data has been well studied in literature. Its application to microarray analysis relies on such algorithms as -means, dimensionality re...
Mehmet Koyutürk, Ananth Grama, Wojciech Szpan...