Sciweavers

1368 search results - page 223 / 274
» Modeling the Telephone Call Network
Sort
View
INFOCOM
2002
IEEE
14 years 2 months ago
Equation-Based Packet Marking for Assured Forwarding Services
Abstract— This paper introduces a new packet marking algorithm that can be used in the context of Assured Forwarding (AF) in the Differentiated Services (DiffServ) framework [1],...
Mohamed A. El-Gendy, Kang G. Shin
WMCSA
2002
IEEE
14 years 2 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
DSN
2000
IEEE
14 years 2 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
ECML
2006
Springer
14 years 1 months ago
Efficient Non-linear Control Through Neuroevolution
Abstract. Many complex control problems are not amenable to traditional controller design. Not only is it difficult to model real systems, but often it is unclear what kind of beha...
Faustino J. Gomez, Jürgen Schmidhuber, Risto ...
ECSCW
2003
13 years 11 months ago
Discovery of Implicit and Explicit Connections Between People Using Email Utterance
This paper is about finding explicit and implicit connections between people by mining semantic associations from their email communications. Following from a sociocognitive stance...
Robert McArthur, Peter Bruza