Sciweavers

1272 search results - page 30 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
AI
2006
Springer
13 years 9 months ago
Generating and evaluating evaluative arguments
Evaluative arguments are pervasive in natural human communication. In countless situations people attempt to advise or persuade their interlocutors that something is desirable (vs...
Giuseppe Carenini, Johanna D. Moore
BROADNETS
2004
IEEE
14 years 22 days ago
Performance Comparison of Guided-Wave Architectures for Space-Division Photonic Switching
The paper1 presents and compares various unicast nonblocking architectures to be used into space-domain photonic switching networks. All the analyzed architectures have been evalu...
Luigi Savastano, Guido Maier, Mario Martinelli, Ac...
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
IPPS
2000
IEEE
14 years 1 months ago
Design and Evaluation of I/O Strategies for Parallel Pipelined STAP Applications
This paper presents experimental results for a parallel pipeline STAP system with I/O task implementation using the parallel file systems on the Intel Paragon and the IBM SP. In ...
Wei-keng Liao, Alok N. Choudhary, Donald Weiner, P...
PAM
2012
Springer
12 years 4 months ago
OFLOPS: An Open Framework for OpenFlow Switch Evaluation
Recent efforts in software-defined networks, such as OpenFlow, give unprecedented access into the forwarding plane of networking equipment. When building a network based on OpenFl...
Charalampos Rotsos, Nadi Sarrar, Steve Uhlig, Rob ...