Sciweavers

483 search results - page 61 / 97
» Patterns of Protocols
Sort
View
IM
2003
13 years 9 months ago
Using Neural Networks to Identify Control and Management Plane Poison Messages
: Poison message failure propagation is a mechanism that has been responsible for large scale failures in both telecommunications and IP networks: Some or all of the network elemen...
Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog
NETWORK
2006
290views more  NETWORK 2006»
13 years 7 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
PAMI
2010
190views more  PAMI 2010»
13 years 2 months ago
Linear Regression for Face Recognition
In this paper, we present a novel approach of face identification by formulating the pattern recognition problem in terms of linear regression. Using a fundamental concept that pat...
Imran Naseem, Roberto Togneri, Mohammed Bennamoun
ICDCS
2012
IEEE
11 years 10 months ago
DARD: Distributed Adaptive Routing for Datacenter Networks
Datacenter networks typically have many paths connecting each host pair to achieve high bisection bandwidth for arbitrary communication patterns. Fully utilizing the bisection ban...
Xin Wu, Xiaowei Yang
ICPR
2006
IEEE
14 years 8 months ago
The Twin Towers Cluster in Torah Codes
In this paper we describe a Torah Code experiment which: ? Focuses on a famous contemporary event. ? Has a simple and explicit data collection. ? Has considerably simpler measurem...
Eliyahu Rips, Art Levitt