Sciweavers

527 search results - page 86 / 106
» On the Suitability of Applications for GMPLS Networks
Sort
View
86
Voted
ICISC
2004
169views Cryptology» more  ICISC 2004»
14 years 11 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
JCP
2008
125views more  JCP 2008»
14 years 9 months ago
Comparative Analysis of Resource Discovery Approaches in Grid Computing
Grid technologies enable the sharing of a wide variety of distributed resources. To utilize these resources, effective Resource Management systems are needed. Resource Management s...
Anju Sharma, Seema Bawa
ICANN
2009
Springer
14 years 7 months ago
Mining Rules for the Automatic Selection Process of Clustering Methods Applied to Cancer Gene Expression Data
Different algorithms have been proposed in the literature to cluster gene expression data, however there is no single algorithm that can be considered the best one independently on...
André C. A. Nascimento, Ricardo Bastos Cava...
ISITA
2010
14 years 6 months ago
Performance analysis and optimal power allocation for hybrid incremental relaying
Relaying technique has been developed considerable attention in response to improve reliability and to extend wireless network coverage. One of conventional relaying technique, inc...
Jaeyoung Lee, Sung-il Kim, Jun Heo
IJNSEC
2008
103views more  IJNSEC 2008»
14 years 9 months ago
On Cipher Design Based on Switchable Controlled Operations
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the desi...
Nikolay A. Moldovyan