Sciweavers

298 search results - page 2 / 60
» Forgetting and Update -- an exploration
Sort
View
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
13 years 10 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
EWCBR
2008
Springer
13 years 6 months ago
Forgetting Reinforced Cases
To meet time constraints, a CBR system must control the time spent searching in the case base for a solution. In this paper, we presents the results of a case study comparing the p...
Houcine Romdhane, Luc Lamontagne
CONEXT
2006
ACM
13 years 10 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford
TSP
2010
12 years 11 months ago
Recursive least squares dictionary learning algorithm
We present the Recursive Least Squares Dictionary Learning Algorithm, RLSDLA, which can be used for learning overcomplete dictionaries for sparse signal representation. Most Dicti...
Karl Skretting, Kjersti Engan
DSRT
2005
IEEE
13 years 10 months ago
Exploring the Use of Local Consistency Measures as Thresholds for Dead Reckoning Update Packet Generation
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as lat...
David J. Roberts, Damien Marshall, Rob Aspin, S&ea...