Sciweavers

673 search results - page 49 / 135
» Request behavior variations
Sort
View
ISCAS
2008
IEEE
113views Hardware» more  ISCAS 2008»
14 years 3 months ago
Stability study of the TCP-RED system using detrended fluctuation analysis
— It has been observed that the TCP-RED system may exhibit instability and oscillatory behavior. Control methods proposed in the past have been based on the analytical models tha...
Xi Chen, Siu Chung Wong, Chi Kong Tse, Ljiljana Tr...
CEC
2007
IEEE
14 years 3 months ago
Parallel learning in heterogeneous multi-robot swarms
Abstract— Designing effective behavioral controllers for mobile robots can be difficult and tedious; this process can be circumvented by using unsupervised learning techniques w...
Jim Pugh, Alcherio Martinoli
IWIA
2005
IEEE
14 years 2 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
UM
2005
Springer
14 years 2 months ago
Detecting When Students Game the System, Across Tutor Subjects and Classroom Cohorts
Building a generalizable detector of student behavior within intelligent tutoring systems presents two challenges: transferring between different cohorts of students (who may devel...
Ryan Shaun Baker, Albert T. Corbett, Kenneth R. Ko...
INFOCOM
2002
IEEE
14 years 1 months ago
On Distinguishing between Internet Power Law Topology Generators
— Recent work has shown that the node degree in the WWW induced graph and the AS-level Internet topology exhibit power laws. Since then several algorithms have been proposed to g...
Tian Bu, Donald F. Towsley