Sciweavers

13180 search results - page 2288 / 2636
» Network Models
Sort
View
ICDCS
2007
IEEE
15 years 11 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
IJCNN
2007
IEEE
15 years 11 months ago
Text Representations for Text Categorization: A Case Study in Biomedical Domain
— In vector space model (VSM), textual documents are represented as vectors in the term space. Therefore, there are two issues in this representation, i.e. (1) what should a term...
Man Lan, Chew Lim Tan, Jian Su, Hwee-Boon Low
IJCNN
2007
IEEE
15 years 11 months ago
Probability Density Function Estimation Using Orthogonal Forward Regression
— Using the classical Parzen window estimate as the target function, the kernel density estimation is formulated as a regression problem and the orthogonal forward regression tec...
Sheng Chen, Xia Hong, Chris J. Harris
IJCNN
2007
IEEE
15 years 11 months ago
Predictive E-Mail Server Performability Analysis Based on Fuzzy Arithmetic
–The performability of disk arrays systems has been studied before. However, in the case of imprecise data, a fuzzy model can be the base for the performability analysis. This pa...
Guillermo Navarro, Milos Manic
INFOCOM
2007
IEEE
15 years 11 months ago
Losing Opportunism: Evaluating Service Integration in an Opportunistic Wireless System
Abstract— In this paper we evaluate interactions among flowlevel performance metrics when integrating QoS and best effort flows in a wireless system using opportunistic schedul...
Hongseok Kim, Gustavo de Veciana
« Prev « First page 2288 / 2636 Last » Next »