Sciweavers

1368 search results - page 25 / 274
» Modeling the Telephone Call Network
Sort
View
IICAI
2003
15 years 2 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
151
Voted
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
15 years 17 days ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
117
Voted
AINA
2005
IEEE
15 years 2 months ago
Traffic Aggregation Based SIP over MPLS Network Architecture
—In this paper, a traffic aggregation based SIP over MPLS network architecture is proposed to integrate SIP protocol with traffic engineering (TE) enabled MPLS network seamlessly...
Bo Rong, Jacques Lebeau, Maria Bennani, Michel Kad...
100
Voted
IWAN
2000
Springer
15 years 4 months ago
Two Rule-Based Building-Block Architectures for Policy-Based Network Control
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Yasusi Kanada
101
Voted
AGENTS
1997
Springer
15 years 4 months ago
Ant-Like Agents for Load Balancing in Telecommunications Networks
This paper describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between arbitrary nodes;...
Ruud Schoonderwoerd, Owen Holland, Janet Bruten