Sciweavers

1568 search results - page 216 / 314
» On a network creation game
Sort
View
GPEM
2006
82views more  GPEM 2006»
14 years 12 months ago
Shortcomings with using edge encodings to represent graph structures
There are various representations for encoding graph structures, such as artificial neural networks (ANNs) and circuits, each with its own strengths and weaknesses. Here we analyz...
Gregory Hornby
ISI
2008
Springer
14 years 12 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
JNCA
2006
92views more  JNCA 2006»
14 years 12 months ago
Cards-to-presentation on the web: generating multimedia contents featuring agent animations
With the goal of supporting the knowledge circulation and creation process in a society, we have studied story-based communication in a network community. On the basis of this res...
Yukiko I. Nakano, Toshihiro Murayama, Masashi Okam...
INTERNET
2007
103views more  INTERNET 2007»
14 years 11 months ago
Publish-Subscribe Information Delivery with Substring Predicates
The content-based publish/subscribe (pub/sub)paradigm for system design is becoming increasingly popular, offering unique benefits for a large number of data-intensive applicatio...
Ioannis Aekaterinidis, Peter Triantafillou
CORR
2004
Springer
148views Education» more  CORR 2004»
14 years 11 months ago
Supporting Bandwidth Guarantee and Mobility for Real-Time Applications on Wireless LANs
The proliferation of IEEE 802.11-based wireless LANs opens up avenues for creation of several tetherless and mobility oriented services. Most of these services, like voice over WL...
Srikant Sharma, Kartik Gopalan, Ningning Zhu, Gang...