Sciweavers

2875 search results - page 486 / 575
» Distributed Reactive Machines
Sort
View
114
Voted
NDSS
2006
IEEE
15 years 9 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
136
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
130
Voted
AIPR
2005
IEEE
15 years 9 months ago
Hyperspectral Detection Algorithms: Operational, Next Generation, on the Horizon
Abstract—The multi-band target detection algorithms implemented in hyperspectral imaging systems represent perhaps the most successful example of image fusion. A core suite of su...
A. Schaum
142
Voted
CCGRID
2005
IEEE
15 years 9 months ago
Empirical evaluation of shared parallel execution on independently scheduled clusters
Parallel machines are typically space shared, or time shared such that only one application executes on a group of nodes at any given time. It is generally assumed that executing ...
M. Ghanesh, S. Kumar, Jaspal Subhlok
178
Voted
COLCOM
2005
IEEE
15 years 9 months ago
Developing a framework for integrating prior problem solving and knowledge sharing histories of a group to predict future group
Using a combination of machine learning probabilistic tools, we have shown that some chemistry students fail to develop productive problem solving strategies through practice alon...
Ron Stevens, Amy Soller, Alessandra Giordani, Luca...