Sciweavers

3004 search results - page 476 / 601
» Nonlinear Mapping Networks
Sort
View
85
Voted
INFOCOM
2002
IEEE
15 years 3 months ago
KNITS: Switch-based Connection Hand-off
—This paper describes a mechanism allowing nodes to hand-off active connections by utilizing connection splicing at an edge-switch serving as a gateway to a server cluster. The m...
Eric Van Hensbergen, Athanasios E. Papathanasiou
IWANN
2001
Springer
15 years 2 months ago
Neurobiological Modeling of Bursting Response During Visual Attention
: Thalamic neurons have an exclusive property named bursting response. Bursting response seems to have a critical role in producing saliency map and encoding conspicuity of locatio...
Reza Rajimehr, Leila Montaser Kouhsari
97
Voted
POLICY
2001
Springer
15 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ICANN
1997
Springer
15 years 2 months ago
On Learning Soccer Strategies
We use simulated soccer to study multiagent learning. Each team's players (agents) share action set and policy but may behave differently due to position-dependent inputs. All...
Rafal Salustowicz, Marco Wiering, Jürgen Schm...
80
Voted
ACSAC
2004
IEEE
15 years 2 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia