Sciweavers

1291 search results - page 188 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SDM
2003
SIAM
120views Data Mining» more  SDM 2003»
15 years 4 months ago
Estimation of Topological Dimension
We present two extensions of the algorithm by Broomhead et al [2] which is based on the idea that singular values that scale linearly with the radius of the data ball can be explo...
Douglas R. Hundley, Michael J. Kirby
108
Voted
SERP
2003
15 years 4 months ago
Performance of Service-Discovery Architectures in Response to Node Failures
Current trends suggest future software systems will rely on service-discovery protocols to combine and recombine distributed services dynamically in reaction to changing condition...
Christopher Dabrowski, Kevin L. Mills, Andrew L. R...
159
Voted
JCM
2006
179views more  JCM 2006»
15 years 2 months ago
Collaborative Allocation of Orthogonal Frequency Division Multiplex Sub-Carriers using the Swarm Intelligence
Abstract-- Future generations of wireless systems require opportunistic spectrum access techniques to effectively detect and access temporarily unused spectrum bands. Cognitive rad...
J. C. Dunat, David Grandblaise, Christian Bonnet
104
Voted
IPPS
2010
IEEE
15 years 16 days ago
Optimizing RAID for long term data archives
We present new methods to extend data reliability of disks in RAID systems for applications like long term data archival. The proposed solutions extend existing algorithms to detec...
Henning Klein, Jörg Keller
122
Voted
ICMLA
2009
15 years 10 days ago
Ranking Electrical Feeders of the New York Power Grid
components of a system by susceptibility to failure. In this extended abstract, we present an ongoing project to rank the underground primary feeders of Consolidated Edison Company...
Philip Gross, Ansaf Salleb-Aouissi, Haimonti Dutta...