Sciweavers

2503 search results - page 363 / 501
» Building Computer Network Attacks
Sort
View
IFIP
2003
Springer
15 years 6 months ago
Testing Mobile Wireless Applications
A framework is described that can be used to build and test application-level software for wireless mobile computing. It emulates the physical mobility of wireless devices by usin...
Ichiro Satoh
IPTPS
2003
Springer
15 years 6 months ago
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Abstract—Structured peer-to-peer overlay networks provide a useful substrate for building distributed applications but there are general concerns over the cost of maintaining the...
Ratul Mahajan, Miguel Castro, Antony I. T. Rowstro...
PDPTA
2004
15 years 3 months ago
An Evaluation of Distributed Scheduling Algorithms Within the DESPOT Architecture
Current systems for managing workload on clusters of workstations, particularly those available for Linuxbased (Beowulf) clusters, are typically based on traditional process-based...
Daniel Andresen, Jeffrey Lebak, Ethan Bowker
107
Voted
ICANN
2010
Springer
15 years 2 months ago
A Bilinear Model for Consistent Topographic Representations
Visual recognition faces the difficult problem of recognizing objects despite the multitude of their appearances. Ample neuroscientific evidence shows that the cortex uses a topogr...
Urs Bergmann, Christoph von der Malsburg
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 1 months ago
Bayesian Optimisation Algorithm for Nurse Scheduling
: Our research has shown that schedules can be built mimicking a human scheduler by using a set of rules that involve domain knowledge. This chapter presents a Bayesian Optimizatio...
Jingpeng Li, Uwe Aickelin