Sciweavers

1040 search results - page 157 / 208
» Resource Usage Verification
Sort
View
111
Voted
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 8 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
131
Voted
AINA
2005
IEEE
15 years 8 months ago
Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control
—The rapid growth of multimedia group-based applications motivates research into QoS guaranteed multicast network. In the multicast network carrying traffics of different QoS req...
Bo Rong, Maria Bennani, Michel Kadoch, Ahmed K. El...
CAMP
2005
IEEE
15 years 8 months ago
Reinforcement Learning for P2P Searching
— For a peer-to-peer (P2P) system holding massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured...
Luca Gatani, Giuseppe Lo Re, Alfonso Urso, Salvato...
ICDCS
2005
IEEE
15 years 8 months ago
A Self-Organizing Lookup Service for Dynamic Ambient Services
The provisioning of Ambient Services is gaining importance as users become more and more embedded in environments that are saturated with electronic devices. In our previous work,...
Klaus Herrmann, Gero Mühl, Michael C. Jaeger
115
Voted
ICPADS
2005
IEEE
15 years 8 months ago
An Efficient Partition-Based Parallel PageRank Algorithm
PageRank becomes the most well-known re-ranking technique of the search results. By its iterative computational nature, the computation takes much computing time and resource. Res...
Bundit Manaskasemsak, Arnon Rungsawang