Sciweavers

1411 search results - page 169 / 283
» On the modelling and performance evaluation of optical burst...
Sort
View
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 9 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
TOCS
2008
131views more  TOCS 2008»
13 years 9 months ago
A generic component model for building systems software
Component-based software structuring principles are now commonly and successfully applied at the application level; but componentisation is far less established when it comes to b...
Geoff Coulson, Gordon S. Blair, Paul Grace, Fran&c...
BMCBI
2011
13 years 4 months ago
Learning genetic epistasis using Bayesian network scoring criteria
Background: Gene-gene epistatic interactions likely play an important role in the genetic basis of many common diseases. Recently, machine-learning and data mining methods have be...
Xia Jiang, Richard E. Neapolitan, M. Michael Barma...
AIMS
2009
Springer
14 years 3 months ago
Dynamics of Resource Closure Operators
Abstract. We propose a framework for managing resources via convergent operators. Operators represent their need for a resource to a designated resource closure operator that manag...
Alva L. Couch, Marc Chiarini
IMC
2004
ACM
14 years 2 months ago
Bandwidth estimation in broadband access networks
There has been much work on developing techniques for estimating the capacity and the available bandwidth of network paths based on end-point measurements. The focus has primarily...
Karthik Lakshminarayanan, Venkata N. Padmanabhan, ...