Sciweavers

1266 search results - page 170 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
128
Voted
IJCAT
2010
133views more  IJCAT 2010»
15 years 2 months ago
A 3D shape classifier with neural network supervision
: The task of 3D shape classification is to assign a set of unordered shapes into pre-tagged classes with class labels, and find the most suitable class for a newly given shape. In...
Zhenbao Liu, Jun Mitani, Yukio Fukui, Seiichi Nish...
COMSWARE
2007
IEEE
15 years 10 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
COMCOM
2008
127views more  COMCOM 2008»
15 years 4 months ago
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks
The idea of building query-oriented routing indices has changed the way of improving keyword search efficiency from the basis as it can learn the content distribution from the que...
Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Y...
ICICS
2003
Springer
15 years 9 months ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 3 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...