Sciweavers

2500 search results - page 285 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
88
Voted
AISS
2010
119views more  AISS 2010»
14 years 8 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
ICIP
2001
IEEE
16 years 14 days ago
Use of neural networks for behaviour understanding in railway transport monitoring applications
In the last years, the interest for advanced video-based surveillance applications is more and more growing. This is especially true in the field of railway urban transport where ...
Claudio Sacchi, Carlo S. Regazzoni, Gianluca Gera,...
DAC
2003
ACM
15 years 12 months ago
Random walks in a supply network
This paper presents a power grid analyzer based on a random walk technique. A linear-time algorithm is first demonstrated for DC analysis, and is then extended to perform transien...
Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
IPPS
2007
IEEE
15 years 5 months ago
Exploring a Multithreaded Methodology to Implement a Network Communication Protocol on the Cyclops-64 Multithreaded Architecture
The IBM Cyclops-64 (C64) chip employs a multithreaded architecture that integrates a large number of hardware thread units on a single chip. A cellular supercomputer is being deve...
Ge Gan, Ziang Hu, Juan del Cuvillo, Guang R. Gao
HOLOMAS
2007
Springer
15 years 5 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...