Sciweavers

928 search results - page 148 / 186
» On adaptive wavelet packets
Sort
View
134
Voted
ACSW
2006
15 years 5 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
115
Voted
ICAI
2004
15 years 5 months ago
Action Inhibition
An explicit exploration strategy is necessary in reinforcement learning (RL) to balance the need to reduce the uncertainty associated with the expected outcome of an action and the...
Myriam Abramson
142
Voted
MTA
2008
150views more  MTA 2008»
15 years 3 months ago
Evaluation and monitoring of video quality for UMA enabled video streaming systems
This paper1 deals with monitoring user perception of multimedia presentations in a Universal Multimedia Access (UMA) enabled system using objective no-reference (NR) metrics. Thes...
R. Venkatesh Babu, Andrew Perkis, Odd Inge Hillest...
110
Voted
TC
2008
15 years 3 months ago
Efficient Deadline-Based QoS Algorithms for High-Performance Networks
Quality of service (QoS) is becoming an attractive feature for high-performance networks and parallel machines because, in those environments, there are different traffic types, ea...
Alejandro Martínez-Vicente, George Apostolo...
159
Voted
PE
2000
Springer
175views Optimization» more  PE 2000»
15 years 3 months ago
Credit-based source-adaptive multilayered video multicast
Spatial and temporal variations in network bandwidth constraints constitute serious challenges to the multicast distribution of real-time video content. This paper presents a vide...
Célio Albuquerque, Brett J. Vickers, Tatsuy...