Sciweavers

1995 search results - page 44 / 399
» From Data Flow Networks to Process Algebras
Sort
View
ICNP
2007
IEEE
15 years 6 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
CN
2006
126views more  CN 2006»
14 years 12 months ago
A measurement study of correlations of Internet flow characteristics
Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of s...
Kun-Chan Lan, John S. Heidemann
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
15 years 6 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
CIA
2008
Springer
15 years 1 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
BMCBI
2010
167views more  BMCBI 2010»
14 years 12 months ago
Inference of sparse combinatorial-control networks from gene-expression data: a message passing approach
Background: Transcriptional gene regulation is one of the most important mechanisms in controlling many essential cellular processes, including cell development, cell-cycle contro...
Marc Bailly-Bechet, Alfredo Braunstein, Andrea Pag...