Sciweavers

2500 search results - page 452 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
JUCS
2008
160views more  JUCS 2008»
13 years 8 months ago
Automatic Construction of Fuzzy Rule Bases: a further Investigation into two Alternative Inductive Approaches
: The definition of the Fuzzy Rule Base is one of the most important and difficult tasks when designing Fuzzy Systems. This paper discusses the results of two different hybrid meth...
Marcos Evandro Cintra, Heloisa de Arruda Camargo, ...
JUCS
2008
125views more  JUCS 2008»
13 years 8 months ago
Evaluation of Agent-based Interactive Systems: Proposal of an Electronic Informer Using Petri Nets
: The evaluation of interactive systems has been an active subject of research for many years. Many methods and tools have been proposed but most of them do not take architectural ...
Chi Dung Tran, Houcine Ezzedine, Christophe Kolski
ET
2007
89views more  ET 2007»
13 years 8 months ago
QCA Circuits for Robust Coplanar Crossing
In this paper, different circuits of Quantum-dot Cellular Automata (QCA) are proposed for the so-called coplanar crossing. Coplanar crossing is one of the most interesting feature...
Sanjukta Bhanja, Marco Ottavi, Fabrizio Lombardi, ...
SIGMETRICS
2008
ACM
13 years 8 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
TDSC
2008
83views more  TDSC 2008»
13 years 8 months ago
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of...
T. Y. Wong, Man Hon Wong, John C. S. Lui