Sciweavers

16082 search results - page 3112 / 3217
» Fireworks Algorithm for Optimization
Sort
View
IEEECIT
2010
IEEE
14 years 9 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
IGARSS
2010
14 years 9 months ago
Multi-band NDSA measurements between two counter-rotating LEO satellites for estimating the tropospheric water vapor profile
NDSA (Normalized Differential Spectral Absorption) was proposed as a differential attenuation measurement method to estimate the total content of water vapor (IWV, Integrated Wate...
Fabrizio Cuccoli, Luca Facheris
IMCSIT
2010
14 years 9 months ago
A Breast Cancer Classifier based on a Combination of Case-Based Reasoning and Ontology Approach
Breast cancer is the second most common form of cancer amongst females and also the fifth most cause of cancer deaths worldwide. In case of this particular type of malignancy, earl...
Essam AbdRabou, Abdel-Badeeh Salem
127
Voted
INFOCOM
2010
IEEE
14 years 9 months ago
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, pri...
Jieun Yu, Heejun Roh, Wonjun Lee, Sangheon Pack, D...
IPPS
2010
IEEE
14 years 9 months ago
Dynamic analysis of the relay cache-coherence protocol for distributed transactional memory
Transactional memory is an alternative programming model for managing contention in accessing shared in-memory data objects. Distributed transactional memory (TM) promises to alle...
Bo Zhang, Binoy Ravindran
« Prev « First page 3112 / 3217 Last » Next »