Sciweavers

1626 search results - page 126 / 326
» Connections in Networks: A Hybrid Approach
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 2 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
VLDB
2004
ACM
173views Database» more  VLDB 2004»
15 years 3 months ago
Enhancing P2P File-Sharing with an Internet-Scale Query Processor
In this paper, we address the problem of designing a scalable, accurate query processor for peerto-peer filesharing and similar distributed keyword search systems. Using a global...
Boon Thau Loo, Joseph M. Hellerstein, Ryan Huebsch...
GECCO
2003
Springer
103views Optimization» more  GECCO 2003»
15 years 3 months ago
Multicriteria Network Design Using Evolutionary Algorithm
In this paper, we revisit a general class of multi-criteria multi-constrained network design problems and attempt to solve, in a novel way, with Evolutionary Algorithms (EAs). A ma...
Rajeev Kumar, Nilanjan Banerjee
ICDM
2010
IEEE
230views Data Mining» more  ICDM 2010»
14 years 8 months ago
Clustering Large Attributed Graphs: An Efficient Incremental Approach
In recent years, many networks have become available for analysis, including social networks, sensor networks, biological networks, etc. Graph clustering has shown its effectivenes...
Yang Zhou, Hong Cheng, Jeffrey Xu Yu
AI50
2006
15 years 1 months ago
What Can AI Get from Neuroscience?
The human brain is the best example of intelligence known, with unsurpassed ability for complex, real-time interaction with a dynamic world. AI researchers trying to imitate its re...
Steve M. Potter