Sciweavers

236 search results - page 18 / 48
» Using Systems Dynamics to Explore Effects of Counterterroris...
Sort
View
AICT
2009
IEEE
164views Communications» more  AICT 2009»
14 years 2 months ago
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffi
Abstract: A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of a...
Yasusi Kanada
ISCA
2010
IEEE
205views Hardware» more  ISCA 2010»
14 years 21 days ago
The virtual write queue: coordinating DRAM and last-level cache policies
In computer architecture, caches have primarily been viewed as a means to hide memory latency from the CPU. Cache policies have focused on anticipating the CPU’s data needs, and...
Jeffrey Stuecheli, Dimitris Kaseridis, David Daly,...
INFOCOM
2008
IEEE
14 years 2 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
CCS
2008
ACM
13 years 9 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
NIPS
2003
13 years 9 months ago
Extending Q-Learning to General Adaptive Multi-Agent Systems
Recent multi-agent extensions of Q-Learning require knowledge of other agents’ payoffs and Q-functions, and assume game-theoretic play at all times by all other agents. This pap...
Gerald Tesauro