Sciweavers

CORR
2000
Springer
100views Education» more  CORR 2000»
13 years 4 months ago
Algorithms for Analysing Firewall and Router Access Lists
Network firewalls and routers use a rule database to decide which packets will be allowed from one network onto another. By filtering packets the firewalls and routers can improve...
Scott Hazelhurst
CORR
2000
Springer
95views Education» more  CORR 2000»
13 years 4 months ago
Effect of different packet sizes on RED performance
We consider the adaptation of random early detection (RED) as an active queue management algorithm for TCP traffic in Internet gateways where different maximum transfer units (MTU...
Stefaan De Cnodder, Omar Elloumi, Kenny Pauwels
CORR
2000
Springer
99views Education» more  CORR 2000»
13 years 4 months ago
Adaptive simulated annealing (ASA): Lessons learned
Adaptive simulated annealing (ASA) is a global optimization algorithm based on an associated proof that the parameter space can be sampled much more efficiently than by using othe...
Lester Ingber
CORR
2000
Springer
92views Education» more  CORR 2000»
13 years 4 months ago
Predicting the expected behavior of agents that learn about agents: the CLRI framework
We describe a framework and equations used to model and predict the behavior of multi-agent systems (MASs) with learning agents. A difference equation is used for calculating the ...
José M. Vidal, Edmund H. Durfee
CORR
2000
Springer
100views Education» more  CORR 2000»
13 years 4 months ago
Transformation-Based Bottom-Up Computation of the Well-Founded Model
Stefan Brass, Jürgen Dix, Burkhard Freitag, U...
CORR
2000
Springer
144views Education» more  CORR 2000»
13 years 4 months ago
Sequence-Based Abstract Interpretation of Prolog
-BASED ABSTRACT INTERPRETATION OF PROLOG1 BAUDOUIN LE CHARLIER, SABINA ROSSI, AND PASCAL VAN HENTENRYCK . Abstract interpretation is a general methodology for systematic developmen...
Baudouin Le Charlier, Sabina Rossi, Pascal Van Hen...
CORR
2000
Springer
73views Education» more  CORR 2000»
13 years 4 months ago
Polynomial-time Computation via Local Inference Relations
Robert Givan, David A. McAllester
CORR
2000
Springer
87views Education» more  CORR 2000»
13 years 4 months ago
Security Policy Consistency
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Pau...