Sciweavers

928 search results - page 148 / 186
» On adaptive wavelet packets
Sort
View
ACSW
2006
14 years 11 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
ICAI
2004
14 years 11 months ago
Action Inhibition
An explicit exploration strategy is necessary in reinforcement learning (RL) to balance the need to reduce the uncertainty associated with the expected outcome of an action and the...
Myriam Abramson
MTA
2008
150views more  MTA 2008»
14 years 9 months ago
Evaluation and monitoring of video quality for UMA enabled video streaming systems
This paper1 deals with monitoring user perception of multimedia presentations in a Universal Multimedia Access (UMA) enabled system using objective no-reference (NR) metrics. Thes...
R. Venkatesh Babu, Andrew Perkis, Odd Inge Hillest...
TC
2008
14 years 9 months ago
Efficient Deadline-Based QoS Algorithms for High-Performance Networks
Quality of service (QoS) is becoming an attractive feature for high-performance networks and parallel machines because, in those environments, there are different traffic types, ea...
Alejandro Martínez-Vicente, George Apostolo...
PE
2000
Springer
175views Optimization» more  PE 2000»
14 years 9 months ago
Credit-based source-adaptive multilayered video multicast
Spatial and temporal variations in network bandwidth constraints constitute serious challenges to the multicast distribution of real-time video content. This paper presents a vide...
Célio Albuquerque, Brett J. Vickers, Tatsuy...