Sciweavers

4208 search results - page 433 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
ICDCS
2009
IEEE
16 years 1 months ago
Characterization and Solution to a Stateful IDS Evasion
We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled using Deterministic F...
Issam Aib, Tung Tran, Raouf Boutaba
ATAL
2007
Springer
15 years 10 months ago
Negotiation partners selection mechanism based on context-dependent similarity relations
This paper proposes a context-dependent case-based mechanism for selecting negotiation partners with the focus on the adaptation of similarity relations to a specific context. Th...
Jakub Brzostowski, Ryszard Kowalczyk
ICDCSW
2005
IEEE
15 years 9 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
IJCNLP
2004
Springer
15 years 9 months ago
A Nearest-Neighbor Method for Resolving PP-Attachment Ambiguity
We present a nearest-neighbor algorithm for resolving prepositional phrase attachment ambiguities. Its performance is significantly higher than previous corpus-based methods for P...
Shaojun Zhao, Dekang Lin
EWCBR
2006
Springer
15 years 7 months ago
Multi-agent Case-Based Reasoning for Cooperative Reinforcement Learners
Abstract. In both research fields, Case-Based Reasoning and Reinforcement Learning, the system under consideration gains its expertise from experience. Utilizing this fundamental c...
Thomas Gabel, Martin Riedmiller