Sciweavers

605 search results - page 59 / 121
» Reducing complexity in tree-like computer interconnection ne...
Sort
View
ICPR
2008
IEEE
14 years 3 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
DCC
2008
IEEE
13 years 9 months ago
A Reliable Chunkless Peer-to-Peer Architecture for Multimedia Streaming
In this paper we propose a chunkless structure for multimedia distribution over peer-to-peer networks. With the proposed approach, the original multimedia packets are partitioned ...
Riccardo Bernardini, Roberto Rinaldo, Andrea Vital...
AIMS
2009
Springer
14 years 3 months ago
Knowledge Management and Promises
Ontological modelling for machine inference has featured prominently in IT management research recently, but there is more immediate scope for knowledge modelling in the realm of h...
Mark Burgess
HPCC
2007
Springer
14 years 2 months ago
Performance Prediction Based Resource Selection in Grid Environments
Deploying Grid technologies by distributing an application over several machines has been widely used for scientific simulations, which have large requirements for computational r...
Peggy Lindner, Edgar Gabriel, Michael M. Resch
EUROPAR
2004
Springer
14 years 2 months ago
Designing Parallel Operating Systems via Parallel Programming
Abstract. Ever-increasing demand for computing capability is driving the construction of ever-larger computer clusters, soon to be reaching tens of thousands of processors. Many fu...
Eitan Frachtenberg, Kei Davis, Fabrizio Petrini, J...