Sciweavers

1973 search results - page 285 / 395
» Network Performance Assessment for Neurofuzzy Data Modelling
Sort
View
117
Voted
ADVAI
2010
110views more  ADVAI 2010»
14 years 10 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
139
Voted
IMC
2009
ACM
15 years 10 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
118
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Analysis of alternating-priority queueing models with (cross) correlated switchover times
This paper analyzes a single server queueing system in which service is alternated between two queues and the server requires a (finite) switchover time to switch from one queue ...
Robin Groenevelt, Eitan Altman
131
Voted
PE
2002
Springer
128views Optimization» more  PE 2002»
15 years 3 months ago
Response times in a two-node queueing network with feedback
The study presented in this paper is motivated by the performance analysis of response times in distributed information systems, where transactions are handled by iterative server...
Robert D. van der Mei, Bart Gijsen, N. in't Veld, ...
134
Voted
CCS
2007
ACM
15 years 10 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen