Sciweavers

4049 search results - page 553 / 810
» Neural Network Trainer through Computer Networks
Sort
View
DCC
2008
IEEE
16 years 3 months ago
Dimension Reduction and Expansion: Distributed Source Coding in a Noisy Environment
We studied the problem of distributed coding and transmission of intercorrelated sources with memory. Different from the conventional distributed source coding structure which rel...
Anna N. Kim, Fredrik Hekland
AWCC
2004
Springer
15 years 9 months ago
Analyzing Web Interfaces of Databases for Retrieving Web Information
Abstract. Much of the information on the web is indeed dynamic content provided through linkups with databases. However, due to heterogeneity of databases, it is difficult to provi...
Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-...
DSN
2009
IEEE
15 years 10 months ago
Intrusion-tolerant self-healing devices for critical infrastructure protection
Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be contr...
Paulo Sousa, Alysson Neves Bessani, Wagner Saback ...
AINA
2006
IEEE
15 years 10 months ago
SENS: A Scalable and Expressive Naming System using CAN Routing Algorithm
Abstract— We design a scalable and expressive naming system called SENS, which can retrieve information of computing and content resources distributed widely on the Internet by e...
Hoaison Nguyen, Toshio Oka, Hiroyuki Morikawa, Tom...
AINA
2009
IEEE
15 years 9 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...