Sciweavers

1869 search results - page 269 / 374
» Analysis of Network Processing Workloads
Sort
View
KES
2005
Springer
15 years 8 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
AINA
2010
IEEE
15 years 8 months ago
SAGE: An Approach to Evaluate the Impact of SOA Governance Policies
We propose SAGE (Service Oriented Architecture Governance Evaluation) as a quantitative approach, to evaluate the impact of SOA governance policies on prominent quality attributes...
Amit Sangroya, Kirti Garg, Vasudeva Varma
151
Voted
IWCMC
2010
ACM
15 years 8 months ago
Group detection in mobility traces
—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
ECAL
2001
Springer
15 years 7 months ago
Evolution of Reinforcement Learning in Uncertain Environments: Emergence of Risk-Aversion and Matching
Reinforcement learning (RL) is a fundamental process by which organisms learn to achieve a goal from interactions with the environment. Using Artificial Life techniques we derive ...
Yael Niv, Daphna Joel, Isaac Meilijson, Eytan Rupp...
ICANN
2001
Springer
15 years 7 months ago
Clustering of EEG-Segments Using Hierarchical Agglomerative Methods and Self-Organizing Maps
EEG segments recorded during microsleep events were transformed to the frequency domain and were subsequently clustered without the common summation of power densities in spectral ...
David Sommer, Martin Golz