Sciweavers

8080 search results - page 1317 / 1616
» From Computer Networks to Agent Networks
Sort
View
ICCS
2005
Springer
15 years 10 months ago
Design and Implementation of DAG-Based Co-scheduling of RPC in the Grid
Effective scheduling in the Grid consisting of heterogeneous and distributed resources is imperative in order to counter unacceptably large overheads of the Grid. We proposed the ...
JiHyun Choi, DongWoo Lee, Rudrapatna S. Ramakrishn...
ISSAC
2005
Springer
107views Mathematics» more  ISSAC 2005»
15 years 10 months ago
Symmetric and semisymmetric graphs construction using G-graphs
Symmetric and semisymmetric graphs are used in many scientific domains, especially parallel computation and interconnection networks. The industry and the research world make a h...
Alain Bretto, Luc Gillibert, Bernard Laget
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
15 years 10 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
PCI
2005
Springer
15 years 10 months ago
Gossip-Based Greedy Gaussian Mixture Learning
Abstract. It has been recently demonstrated that the classical EM algorithm for learning Gaussian mixture models can be successfully implemented in a decentralized manner by resort...
Nikos A. Vlassis, Yiannis Sfakianakis, Wojtek Kowa...
RAID
2005
Springer
15 years 10 months ago
Behavioral Distance for Intrusion Detection
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs and executing on different platforms—behave si...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
« Prev « First page 1317 / 1616 Last » Next »