Sciweavers

2715 search results - page 157 / 543
» Network bucket testing
Sort
View
IJON
2006
112views more  IJON 2006»
13 years 9 months ago
Palmprint recognition using FastICA algorithm and radial basis probabilistic neural network
This paper proposes a novel and successful method for recognizing palmprint based on radial basis probabilistic neural network (RBPNN) proposed by us. The RBPNN is trained by the ...
Li Shang, De-Shuang Huang, Ji-Xiang Du, Chun-Hou Z...
EOR
2007
147views more  EOR 2007»
13 years 9 months ago
Routing and wavelength assignment in optical networks using bin packing based algorithms
This paper addresses the problem of routing and wavelength assignment (RWA) of static lightpath requests in wavelength routed optical networks. The objective is to minimize the nu...
Nina Skorin-Kapov
TEC
2002
89views more  TEC 2002»
13 years 8 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
IFIP
2009
Springer
13 years 7 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
HICSS
2011
IEEE
238views Biometrics» more  HICSS 2011»
13 years 29 days ago
Smoking Behavior and Friendship Formation: The Importance of Time Heterogeneity in Studying Social Network Dynamics
—This study illustrates the importance of assessing and accounting for time heterogeneity in longitudinal social network analysis. We apply the time heterogeneity model selection...
Joshua Alfred Lospinoso, Danielle J. Satchell