Sciweavers

1737 search results - page 57 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 9 months ago
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
SIGCOMM
2005
ACM
14 years 2 months ago
Policing congestion response in an internetwork using re-feedback
This paper introduces a novel feedback arrangement, termed re-feedback. It ensures metrics in data headers such as time to live and congestion notification will arrive at each re...
Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilf...
ICDM
2006
IEEE
173views Data Mining» more  ICDM 2006»
14 years 3 months ago
Trajectory Analysis for Soccer Players
In order to make good strategies, soccer coaches analyze the archives of matches, which can be effectively considered as a set of trajectories. We can extract several useful infor...
Chan-Hyun Kang, Jung-Rae Hwang, Ki-Joune Li
NIPS
2004
13 years 10 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
MTA
2000
145views more  MTA 2000»
13 years 9 months ago
Adaptive Multimedia Presentation Strategies
Multimedia presentations comprise various media objects such as text, audio, image, and video that are delivered to users according to certain temporal relationships. In stored mul...
B. Prabhakaran