Sciweavers

2863 search results - page 287 / 573
» Constructing minimum-interference networks
Sort
View
IDEAL
2004
Springer
15 years 9 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin
158
Voted
HPCS
2002
IEEE
15 years 9 months ago
CoStore: A Reliable and Highly Available Storage System Using Clusters
The CoStore cluster architecture has been proposed to construct a reliable and highly available storage system. A prototype CoStore has been implemented and its performance has be...
Yong Chen, Lionel M. Ni, Cheng-Zhong Xu, Mingyao Y...
ICPP
1998
IEEE
15 years 8 months ago
Efficient Multicast on Myrinet using Link-Level Flow Control
This paper studies the implementation of efficient multicast protocols for Myrinet, a switched, wormhole-routed, Gigabit-per-second network technology. Since Myrinet does not supp...
Raoul Bhoedjang, Tim Rühl, Henri E. Bal
ACNS
2009
Springer
113views Cryptology» more  ACNS 2009»
15 years 8 months ago
Fast Packet Classification Using Condition Factorization
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
AINA
2007
IEEE
15 years 8 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...