Sciweavers

1088 search results - page 164 / 218
» Independence of Negative Constraints
Sort
View
ICARIS
2007
Springer
15 years 4 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
DSN
2006
IEEE
15 years 3 months ago
R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools
— We consider shared resource pool management taking into account per-application quality of service (QoS) requirements and server failures. Application QoS requirements are de...
Ludmila Cherkasova, Jerome A. Rolia
DSN
2006
IEEE
15 years 3 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
GLOBECOM
2006
IEEE
15 years 3 months ago
Transmit Beamforming with Finite-Rate Feedback for Frequency-Selective Channels
— In this paper, we consider beamforming with finite– rate feedback for frequency–selective channels with decisionfeedback equalization (DFE) at the receiver. Using average ...
Yang-wen Liang, Robert Schober, Wolfgang H. Gersta...
ICMCS
2006
IEEE
111views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Optimized Rate Allocation for Unbalanced Multiple Description Video Coding Over Unreliable Packet Network
Video transmission over unreliable packet network is in general hampered by the packet losses and constraint by stringent playback deadline. With these two key factors in consider...
Bin Li, Feng Huang, Lifeng Shu, Shiqiang Yang