Sciweavers

914 search results - page 103 / 183
» Effective vaccination policies
Sort
View
95
Voted
ICC
2008
IEEE
164views Communications» more  ICC 2008»
15 years 7 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
83
Voted
LCN
1997
IEEE
15 years 4 months ago
Early Selective Packet Discard for Alternating Resource Access of TCP over ATM-UBR
W e investigate packet discarding schemes for TCP over ATM with UBR service. In doing so, we tested the eflective throughput of two existing schemes, Partial Pnwlcet Discard(PPD) ...
Kangsik Cheon, Shivendra S. Panwar
101
Voted
WSC
2008
15 years 2 months ago
Simulation of the research process
This paper presents first steps towards the development of a formal model of the research process. We evaluate the use of simulation as a tool for the evaluation of research strat...
Muaz Niazi, Amir Hussain, Abdul Rauf Baig, Saeed B...
AAAI
1998
15 years 1 months ago
Tree Based Discretization for Continuous State Space Reinforcement Learning
Reinforcement learning is an effective technique for learning action policies in discrete stochastic environments, but its efficiency can decay exponentially with the size of the ...
William T. B. Uther, Manuela M. Veloso
100
Voted
CONCURRENCY
2008
102views more  CONCURRENCY 2008»
15 years 20 days ago
Dynamic data replication in LCG 2008
To provide performant access to data from high energy physics experiments such as the Large Hadron Collider (LHC), controlled replication of files among grid sites is required. Dy...
Caitriana Nicholson, David G. Cameron, A. T. Doyle...