Sciweavers

3524 search results - page 319 / 705
» Issues in Active Databases
Sort
View
BC
2007
107views more  BC 2007»
15 years 5 months ago
Decoding spike train ensembles: tracking a moving stimulus
We consider the issue of how to read out the information from nonstationary spike train ensembles. Based on the theory of censored data in statistics, we propose a ‘censored’ m...
Enrico Rossoni, Jianfeng Feng
140
Voted
CN
2008
162views more  CN 2008»
15 years 4 months ago
A cache-based internet protocol address lookup architecture
This paper proposes a novel Internet Protocol (IP) packet forwarding architecture for IP routers. This architecture is comprised of a non-blocking Multizone Pipelined Cache (MPC) ...
Soraya Kasnavi, Paul Berube, Vincent C. Gaudet, Jo...
127
Voted
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
CII
2007
73views more  CII 2007»
15 years 4 months ago
Competency characterisation by means of work situation modelling
Nowadays companies have to face the rapid evolution of their competitive environment. In the field of design, project managers are aware of both the impact of the designers’ com...
Farouk Belkadi, Eric Bonjour, Maryvonne Dulmet
JSAC
2008
167views more  JSAC 2008»
15 years 4 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell