Sciweavers

1291 search results - page 188 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SDM
2003
SIAM
120views Data Mining» more  SDM 2003»
13 years 10 months ago
Estimation of Topological Dimension
We present two extensions of the algorithm by Broomhead et al [2] which is based on the idea that singular values that scale linearly with the radius of the data ball can be explo...
Douglas R. Hundley, Michael J. Kirby
SERP
2003
13 years 10 months ago
Performance of Service-Discovery Architectures in Response to Node Failures
Current trends suggest future software systems will rely on service-discovery protocols to combine and recombine distributed services dynamically in reaction to changing condition...
Christopher Dabrowski, Kevin L. Mills, Andrew L. R...
JCM
2006
179views more  JCM 2006»
13 years 8 months ago
Collaborative Allocation of Orthogonal Frequency Division Multiplex Sub-Carriers using the Swarm Intelligence
Abstract-- Future generations of wireless systems require opportunistic spectrum access techniques to effectively detect and access temporarily unused spectrum bands. Cognitive rad...
J. C. Dunat, David Grandblaise, Christian Bonnet
IPPS
2010
IEEE
13 years 6 months ago
Optimizing RAID for long term data archives
We present new methods to extend data reliability of disks in RAID systems for applications like long term data archival. The proposed solutions extend existing algorithms to detec...
Henning Klein, Jörg Keller
ICMLA
2009
13 years 6 months ago
Ranking Electrical Feeders of the New York Power Grid
components of a system by susceptibility to failure. In this extended abstract, we present an ongoing project to rank the underground primary feeders of Consolidated Edison Company...
Philip Gross, Ansaf Salleb-Aouissi, Haimonti Dutta...