Sciweavers

866 search results - page 14 / 174
» Networked Slepian-Wolf: Theory and Algorithms
Sort
View
ACMSE
2005
ACM
15 years 5 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
SIGECOM
2009
ACM
112views ECommerce» more  SIGECOM 2009»
15 years 6 months ago
Network bargaining: algorithms and structural results
We consider models for bargaining in social networks, in which players are represented by vertices and edges represent bilateral opportunities for deals between pairs of players. ...
Tanmoy Chakraborty, Michael Kearns, Sanjeev Khanna
INFOCOM
2010
IEEE
14 years 10 months ago
Distributed Algorithms for Approximating Wireless Network Capacity
—In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distribut...
Michael Dinitz
SODA
2010
ACM
151views Algorithms» more  SODA 2010»
15 years 9 months ago
A Max-Flow/Min-Cut Algorithm for a Class of Wireless Networks
The linear deterministic model of relay channels is a generalization of the traditional directed network model which has become popular in the study of the flow of information ove...
S. M. Sadegh Tabatabaei Yazdi, Serap A. Savari
IJON
2006
111views more  IJON 2006»
14 years 11 months ago
Dynamic pruning algorithm for multilayer perceptron based neural control systems
Generalization ability of neural networks is very important and a rule of thumb for good generalization in neural systems is that the smallest system should be used to fit the tra...
Jie Ni, Qing Song