Sciweavers

2493 search results - page 407 / 499
» A survey of network virtualization
Sort
View
IADIS
2003
14 years 11 months ago
Using Combined Markov Chains to Predict WWW Navigation Paths
The Internet network provides access to several hundreds of million sites and expands at a rate of a million pages a day. Yet, given the rapid and anarchical nature of its evoluti...
Y. Hafri
ISI
2008
Springer
14 years 10 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
ALIFE
2004
14 years 10 months ago
Adaptability and Diversity in Simulated Turn-taking Behavior
Turn-taking behavior is simulated in a coupled-agents system. Each agent is modeled as a mobile robot with two wheels. A recurrent neural network is used to produce the motor outpu...
Hiroyuki Iizuka, Takashi Ikegami
IDA
2010
Springer
14 years 8 months ago
Multi-dimensional data construction method with its application to learning from small-sample-sets
Insufficient training data is one of the major problems in neural network learning, because it leads to poor learning performance. In order to enhance an intelligent learning proc...
Hsiao-Fan Wang, Chun-Jung Huang
JNSM
2010
110views more  JNSM 2010»
14 years 4 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...