Sciweavers

8080 search results - page 204 / 1616
» From Computer Networks to Agent Networks
Sort
View
IDEAL
2003
Springer
15 years 9 months ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...
AAAI
1990
15 years 4 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
DSOM
1999
Springer
15 years 8 months ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
IJCNN
2006
IEEE
15 years 9 months ago
Language Acquisition and Symbol Grounding Transfer with Neural Networks and Cognitive Robots
— Neural networks have been proposed as an ideal cognitive modeling methodology to deal with the symbol grounding problem. More recently, such neural network approaches have been...
Angelo Cangelosi, Emmanouil Hourdakis, Vadim Tikha...
CIA
2003
Springer
15 years 9 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler