Sciweavers

3004 search results - page 476 / 601
» Nonlinear Mapping Networks
Sort
View
INFOCOM
2002
IEEE
14 years 1 months ago
KNITS: Switch-based Connection Hand-off
—This paper describes a mechanism allowing nodes to hand-off active connections by utilizing connection splicing at an edge-switch serving as a gateway to a server cluster. The m...
Eric Van Hensbergen, Athanasios E. Papathanasiou
IWANN
2001
Springer
14 years 22 days ago
Neurobiological Modeling of Bursting Response During Visual Attention
: Thalamic neurons have an exclusive property named bursting response. Bursting response seems to have a critical role in producing saliency map and encoding conspicuity of locatio...
Reza Rajimehr, Leila Montaser Kouhsari
POLICY
2001
Springer
14 years 22 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ICANN
1997
Springer
14 years 13 days ago
On Learning Soccer Strategies
We use simulated soccer to study multiagent learning. Each team's players (agents) share action set and policy but may behave differently due to position-dependent inputs. All...
Rafal Salustowicz, Marco Wiering, Jürgen Schm...
ACSAC
2004
IEEE
14 years 1 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia