Sciweavers

1945 search results - page 151 / 389
» Pursuit-Evasion in Models of Complex Networks
Sort
View
MMNS
2004
89views Multimedia» more  MMNS 2004»
13 years 9 months ago
Automated Validation of Service Configuration on Network Devices
Due to the significant development of network services in the past few years, their validation has become increasingly difficult. The advent of novel approaches to the issue of val...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...
FLAIRS
2003
13 years 9 months ago
Using Bayesian Networks for Cleansing Trauma Data
Medical data is unique due to its large volume, heterogeneity and complexity. This necessitates costly active participation of medical domain experts in the task of cleansing medi...
Prashant Doshi, Lloyd Greenwald, John R. Clarke
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
ICN
2007
Springer
14 years 2 months ago
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks
— In this paper, we use the Markov Decision Process (MDP) technique to find the optimal code allocation policy in High-Speed Downlink Packet Access (HSDPA) networks. A discrete ...
Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadar...
CIVR
2004
Springer
111views Image Analysis» more  CIVR 2004»
14 years 1 months ago
An Inference Network Approach to Image Retrieval
Most image retrieval systems only allow a fragment of text or an example image as a query. Most users have more complex information needs that are not easily expressed in either of...
Donald Metzler, R. Manmatha