Sciweavers

2715 search results - page 227 / 543
» Network bucket testing
Sort
View
CN
2006
99views more  CN 2006»
13 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
JCM
2006
144views more  JCM 2006»
13 years 10 months ago
Using Micro-Genetic Algorithms to Improve Localization in Wireless Sensor Networks
Wireless sensor networks are widely adopted in many location-sensitive applications including disaster management, environmental monitoring, military applications where the precise...
Vincent Tam, King-Yip Cheng, King-Shan Lui
TSMC
2008
172views more  TSMC 2008»
13 years 10 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
IJCSA
2007
100views more  IJCSA 2007»
13 years 10 months ago
Using Artificial Neural networks for the modelling of a distillation column
The main aim of this paper is to establish a reliable model both for the steady-state and unsteady-state regimes of a nonlinear process. The use of this model should reflect the t...
Yahya Chetouani
TNN
1998
254views more  TNN 1998»
13 years 10 months ago
Comparative analysis of fuzzy ART and ART-2A network clustering performance
—Adaptive resonance theory (ART) describes a family of self-organizing neural networks, capable of clustering arbitrary sequences of input patterns into stable recognition codes....
T. Frank, Karl-Friedrich Kraiss, Torsten Kuhlen