Sciweavers

6652 search results - page 1280 / 1331
» On the effective evaluation of TCP
Sort
View
CERA
2010
105views more  CERA 2010»
13 years 7 months ago
Implications of Alternative Multilevel Design Methods for Design Process Management
Multilevel design problems are typically decomposed into a hierarchy of distributed and strongly coupled sub-problems, each solved by design teams with specialized knowledge and t...
David Shahan, Carolyn Seepersad Seepersad
COMCOM
2008
127views more  COMCOM 2008»
13 years 7 months ago
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks
The idea of building query-oriented routing indices has changed the way of improving keyword search efficiency from the basis as it can learn the content distribution from the que...
Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Y...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 7 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 7 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 7 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
« Prev « First page 1280 / 1331 Last » Next »