Sciweavers

2715 search results - page 121 / 543
» Network bucket testing
Sort
View
118
Voted
IPPS
2006
IEEE
15 years 8 months ago
Neighbourhood maps: decentralised ranking in small-world P2P networks
Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In large-scale real world ...
Matteo Dell'Amico
103
Voted
IPSN
2005
Springer
15 years 8 months ago
Scalable topology control for deployment-support networks
— Deployment-support networks (DSNs) have been proposed as a novel tool for the development, test, deployment, and validation of wireless sensor networks. They are expected to en...
Jan Beutel, Matthias Dyer, Lennart Meier, Lothar T...
142
Voted
GECCO
2005
Springer
196views Optimization» more  GECCO 2005»
15 years 8 months ago
Breeding swarms: a new approach to recurrent neural network training
This paper shows that a novel hybrid algorithm, Breeding Swarms, performs equal to, or better than, Genetic Algorithms and Particle Swarm Optimizers when training recurrent neural...
Matthew Settles, Paul Nathan, Terence Soule
124
Voted
ADHOCNOW
2004
Springer
15 years 8 months ago
Adaptive Probing and Communication in Sensor Networks
Sensor networks consist of multiple low-cost, autonomous, ad-hoc sensors, that periodically probe and react to the environment and communicate with other sensors or devices. A prim...
Iftach Ragoler, Yossi Matias, Nimrod Aviram
114
Voted
ACSAC
2000
IEEE
15 years 7 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford