Sciweavers

801 search results - page 87 / 161
» Robust Software
Sort
View
ISN
2000
Springer
162views Communications» more  ISN 2000»
14 years 1 months ago
An Approach to Network Control and Resource Management Based on Intelligent Agents
Network Control is currently carried out mainly by means of signalling protocols. Although these protocols are robust and facilitate standardisation, they present several drawback...
Evangelos Vayias, John Soldatos, Nikolas Mitrou
IWAN
2000
Springer
14 years 1 months ago
Differentiated Quality of Service in Application Layer Active Networks
A novel approach to quality of service control in an active service network (application layer active network) is described. The approach makes use of a distributed genetic algori...
Chris M. Roadknight, Ian W. Marshall
ICPR
2010
IEEE
14 years 1 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
DMIN
2006
105views Data Mining» more  DMIN 2006»
13 years 11 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen
GRAPHICSINTERFACE
2001
13 years 11 months ago
Accelerated Splatting using a 3D Adjacency Data Structure
We introduce a new acceleration to the standard splatting volume rendering algorithm. Our method achieves full colour (32-bit), depth-sorted and shaded volume rendering significan...
Jeff Orchard, Torsten Möller