Sciweavers

2715 search results - page 344 / 543
» Network bucket testing
Sort
View
CONEXT
2007
ACM
14 years 1 months ago
A hybrid finite automaton for practical deep packet inspection
Deterministic finite automata (DFAs) are widely used to perform regular expression matching in linear time. Several techniques have been proposed to compress DFAs in order to redu...
Michela Becchi, Patrick Crowley
CONEXT
2007
ACM
14 years 1 months ago
Do you know what you are generating?
Software-based traffic generators are commonly used in experimental research on computer networks. However, there are no much studies focusing on how such instruments are accurate...
Alberto Dainotti, Alessio Botta, Antonio Pescap&eg...
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
14 years 1 months ago
Evolving cooperative behavior in a power market
This paper presents an evolutionary algorithm to develop cooperative strategies for power buyers in a deregulated electrical power market. Cooperative strategies are evolved throu...
Dipti Srinivasan, Dakun Woo, Lily Rachmawati, Kong...
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
CIBCB
2005
IEEE
13 years 11 months ago
Neuro-fuzzy Prediction of Biological Activity and Rule Extraction for HIV-1 Protease Inhibitors
— A fuzzy neural network (FNN) and multiple linear regression (MLR) were used to predict biological activities of 26 newly designed HIV-1 protease potential inhibitory compounds....
Razvan Andonie, Levente Fabry-Asztalos, Catharine ...