Sciweavers

608 search results - page 105 / 122
» Random Systems with Complete Connections
Sort
View
CCS
2010
ACM
13 years 9 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
BMCBI
2010
125views more  BMCBI 2010»
13 years 9 months ago
Compartmentalization of the Edinburgh Human Metabolic Network
Background: Direct in vivo investigation of human metabolism is complicated by the distinct metabolic functions of various sub-cellular organelles. Diverse micro-environments in d...
Tong Hao, Hongwu Ma, Xue-Ming Zhao, Igor Goryanin
INFOCOM
2010
IEEE
13 years 8 months ago
Socially-Aware Network Design Games
—In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wh...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
CN
2011
127views more  CN 2011»
13 years 4 months ago
A game theoretic analysis of network design with socially-aware users
In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wher...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
NAACL
2003
13 years 11 months ago
Implicit Trajectory Modeling through Gaussian Transition Models for Speech Recognition
It is well known that frame independence assumption is a fundamental limitation of current HMM based speech recognition systems. By treating each speech frame independently, HMMs ...
Hua Yu, Tanja Schultz