Sciweavers

2419 search results - page 367 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
ISI
2008
Springer
13 years 9 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
IAJIT
2010
87views more  IAJIT 2010»
13 years 7 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
HPDC
2006
IEEE
14 years 3 months ago
XtremLab: A System for Characterizing Internet Desktop Grids
Desktop grid (DG) systems use the idle computing power of many volunteered desktop PC’s on the Internet to support large-scale computation and storage. For over a decade, DG sys...
Paul Malecot, Derrick Kondo, Gilles Fedak
ICPADS
2006
IEEE
14 years 3 months ago
Acceleration of Maximum Likelihood Estimation for Tomosynthesis Mammography
Maximum likelihood (ML) estimation is used during tomosynthesis mammography reconstruction. A single reconstruction involves the processing of highresolution projection images, wh...
Juemin Zhang, Waleed Meleis, David R. Kaeli, Tao W...
GECCO
2008
Springer
363views Optimization» more  GECCO 2008»
13 years 10 months ago
Towards high speed multiobjective evolutionary optimizers
One of the major difficulties when applying Multiobjective Evolutionary Algorithms (MOEA) to real world problems is the large number of objective function evaluations. Approximate...
A. K. M. Khaled Ahsan Talukder