Sciweavers

1266 search results - page 217 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IJCNN
2008
IEEE
14 years 2 months ago
Self-organizing neural models integrating rules and reinforcement learning
— Traditional approaches to integrating knowledge into neural network are concerned mainly about supervised learning. This paper presents how a family of self-organizing neural m...
Teck-Hou Teng, Zhong-Ming Tan, Ah-Hwee Tan
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 22 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
WCNC
2010
IEEE
14 years 10 days ago
Modelling Angle Spread Autocorrelations and the Impact on Multi-User Diversity Gains
—One way of modelling the wireless channel is in a statistical manner, based on a few parameters describing the characteristics of the environment. In most current wireless chann...
Niklas Jalden, Per Zetterberg, Björn E. Otter...
IS
2008
13 years 8 months ago
A framework for semantic grouping in P2P databases
Abstract. Sharing of structured data in decentralized environments is a challenging problem, especially in the absence of a global schema. Social network structures map network lin...
Verena Kantere, Dimitrios Tsoumakos, Timos K. Sell...
CCR
1998
90views more  CCR 1998»
13 years 8 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman