Sciweavers

312 search results - page 44 / 63
» Balancing performance, robustness and flexibility in routing...
Sort
View
IMC
2009
ACM
15 years 5 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
TSMC
2002
134views more  TSMC 2002»
14 years 11 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
ATAL
2004
Springer
15 years 4 months ago
Framework to Control Emergent Survivability of Multi Agent Systems
As the science of multi-agent systems matures, many developers are looking to deploy mission critical applications on distributed multi-agent systems (DMAS). Due to their distribu...
Aaron Helsinger, Karl Kleinmann, Marshall Brinn
ATAL
2005
Springer
15 years 5 months ago
AgentSteel: an agent-based online system for the planning and observation of steel production
The steel production of the German company Saarstahl AG, a global respected steel manufacturer, represents a Supply Chain which comprehends several time-critical and highly interf...
Sven Jacobi, Cristián Madrigal-Mora, Esteba...
CLOUDCOM
2010
Springer
14 years 9 months ago
REMEM: REmote MEMory as Checkpointing Storage
Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively stu...
Hui Jin, Xian-He Sun, Yong Chen, Tao Ke