Sciweavers

160 search results - page 18 / 32
» The Analysis and Optimization of Collective Communications o...
Sort
View
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 8 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
JSW
2007
96views more  JSW 2007»
13 years 7 months ago
IP-based Clustering for Peer-to-Peer Overlays
— The efficiency of overlay networks built on top of the IP network is often threatened by the mismatch between the topologies of the overlay and the underlying IP network, resu...
Piotr Karwaczynski, Jaka Mocnik
ICC
2009
IEEE
190views Communications» more  ICC 2009»
13 years 5 months ago
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes ...
Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffr&egrav...
SDM
2003
SIAM
184views Data Mining» more  SDM 2003»
13 years 9 months ago
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data
The problem of finding clusters in data is challenging when clusters are of widely differing sizes, densities and shapes, and when the data contains large amounts of noise and out...
Levent Ertöz, Michael Steinbach, Vipin Kumar
GRID
2003
Springer
14 years 28 days ago
Applying Database Support for Large Scale Data Driven Science in Distributed Environments
There is a rapidly growing set of applications, referred to as data driven applications, in which analysis of large amounts of data drives the next steps taken by the scientist, e...
Sivaramakrishnan Narayanan, Ümit V. Ça...