Sciweavers

9888 search results - page 1801 / 1978
» Active Algorithm Selection
Sort
View
ICC
2000
IEEE
124views Communications» more  ICC 2000»
15 years 3 months ago
A Fair Traffic Conditioner for the Assured Service in a Differentiated Services Internet
— A research issue under investigation in the context of differentiated services (DiffServ) is the fair distribution of bandwidth between aggregates sharing the same Assured Forw...
Ilias Andrikopoulos, Lloyd Wood, George Pavlou
MSS
2000
IEEE
160views Hardware» more  MSS 2000»
15 years 3 months ago
Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device
Phoenix is a fault-tolerantreal-time network-attachedstorage device (NASD). Like other NASD architectures, Phoenix provides an object-based interface to data stored on network-att...
Ashish Raniwala, Srikant Sharma, Anindya Neogi, Tz...
AIME
1997
Springer
15 years 2 months ago
Detecting Very Early Stages of Dementia from Normal Aging with Machine Learning Methods
We used Machine Learning (ML) methods to learn the best decision rules to distinguish normal brain aging from the earliest stages of dementia using subsamples of 198 normal and 244...
William Rodman Shankle, Subramani Mani, Michael J....
ICCCN
2007
IEEE
15 years 2 months ago
Applying Wavelet De-noising to Improve TCP Throughput in AQM queues with Existence of Unresponsive Traffic
Abstract-- in the current Internet, congestion control is performed jointly by the end systems running the TCP protocol and by routers running Active Queue Management (AQM) algorit...
Yi Pan, Wei K. Tsai, Tatsuya Suda
ACSAC
2004
IEEE
15 years 2 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
« Prev « First page 1801 / 1978 Last » Next »