Sciweavers

206 search results - page 29 / 42
» Network selection using fuzzy logic
Sort
View
EXPERT
2011
131views more  EXPERT 2011»
14 years 1 months ago
Grid Monitoring and Market Risk Management
—With the rapid development of the electricity market, both grid and market operations need to be carefully coordinated and monitored in real time. This paper focuses on system m...
Yufan Guan, Mladen Kezunovic
WWW
2009
ACM
15 years 10 months ago
Towards lightweight and efficient DDOS attacks detection for web server
In this poster, based on our previous work in building a lightweight DDoS (Distributed Denial-of-Services) attacks detection mechanism for web server using TCM-KNN (Transductive C...
Li Guo, Qin-Wu Nie, Tianbo Lu, Yang Li, Zhihong Ti...
SSPR
2004
Springer
15 years 3 months ago
Recognition of Handwritten Numerals Using a Combined Classifier with Hybrid Features
Off-line handwritten numeral recognition is a very difficult task. It is hard to achieve high recognition results using a single set of features and a single classifier, since hand...
Kyoung Min Kim, Joong Jo Park, Young Gi Song, In-C...
TKDE
2010
149views more  TKDE 2010»
14 years 4 months ago
A Configurable Rete-OO Engine for Reasoning with Different Types of Imperfect Information
The RETE algorithm is a very efficient option for the development of a rule-based system, but it supports only boolean, first order logic. Many real-world contexts, instead, requir...
Davide Sottara, Paola Mello, Mark Proctor
DSN
2007
IEEE
15 years 4 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble