Sciweavers

11121 search results - page 2006 / 2225
» Computing with Continuous Change
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
14 years 10 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
JISE
2010
144views more  JISE 2010»
14 years 10 months ago
Variant Methods of Reduced Set Selection for Reduced Support Vector Machines
In dealing with large datasets the reduced support vector machine (RSVM) was proposed for the practical objective to overcome the computational difficulties as well as to reduce t...
Li-Jen Chien, Chien-Chung Chang, Yuh-Jye Lee
TITS
2010
201views Education» more  TITS 2010»
14 years 10 months ago
A Review of the Applications of Agent Technology in Traffic and Transportation Systems
The agent computing paradigm is rapidly emerging as one of the powerful technologies for the development of largescale distributed systems to deal with the uncertainty in a dynamic...
Bo Chen, Harry H. Cheng
TON
2010
162views more  TON 2010»
14 years 10 months ago
Fast Algorithms for Resource Allocation in Wireless Cellular Networks
Abstract--We consider a scheduled orthogonal frequency division multiplexed (OFDM) wireless cellular network where the channels from the base-station to the mobile users undergo fl...
Ritesh Madan, Stephen P. Boyd, Sanjay Lall
TON
2010
188views more  TON 2010»
14 years 10 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
« Prev « First page 2006 / 2225 Last » Next »