Sciweavers

1010 search results - page 93 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
IPPS
2005
IEEE
15 years 5 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry
AIMS
2008
Springer
15 years 1 months ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...
IPPS
2003
IEEE
15 years 5 months ago
Performance Analysis of Distributed Search in Open Agent Systems
In open multi-agent systems agents need resources provided by other agents but they are not aware of which agents provide the particular resources. Most solutions to this problem ...
Vassilios V. Dimakopoulos, Evaggelia Pitoura
81
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen
IWCMC
2009
ACM
15 years 6 months ago
On the capacity of BICM with QAM constellations
Abstract—In this tutorial paper we analyze the capacity of bitinterleaved coded modulation (BICM) with quadrature amplitude modulation (QAM) constellations, and we pay special at...
Alex Alvarado, Erik Agrell, Arne Svensson