Sciweavers

5056 search results - page 339 / 1012
» Network Coding Theory
Sort
View
IWANN
2001
Springer
15 years 8 months ago
Non-symmetric Support Vector Machines
A novel approach to calculate the generalization error of the support vector machines and a new support vector machine–nonsymmatic support vector machine–is proposed here. Our ...
Jianfeng Feng
CORR
2006
Springer
110views Education» more  CORR 2006»
15 years 4 months ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja
JCT
2008
120views more  JCT 2008»
15 years 4 months ago
Approximate min-max theorems for Steiner rooted-orientations of graphs and hypergraphs
Given an undirected hypergraph and a subset of vertices S V with a specified root vertex r S, the STEINER ROOTED-ORIENTATION problem is to find an orientation of all the hypered...
Tamás Király, Lap Chi Lau
VIZSEC
2007
Springer
15 years 10 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
EURONGI
2008
Springer
15 years 5 months ago
Image Recognition Traffic Patterns for Wireless Multimedia Sensor Networks
The objective of this work is to identify some of the traffic characteristics of Wireless Multimedia Sensor Networks (WMSN). Applications such as video surveillance sensor networks...
Ruken Zilan, José M. Barceló-Ordinas...