Sciweavers

2912 search results - page 433 / 583
» Overlay Networks - Implementation by Specification
Sort
View
AAAI
2006
15 years 6 months ago
An Edge Deletion Semantics for Belief Propagation and its Practical Impact on Approximation Quality
We show in this paper that the influential algorithm of iterative belief propagation can be understood in terms of exact inference on a polytree, which results from deleting enoug...
Arthur Choi, Adnan Darwiche
CSREASAM
2006
15 years 6 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
IC
2004
15 years 6 months ago
Controlling Inbound Traffic
This work considers the problem of prioritizing the inbound TCP traffic of an organization network. The objective is to allocate dynamically a specific share of the incoming link ...
Saad Biaz
CIC
2003
150views Communications» more  CIC 2003»
15 years 6 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar
BNT
1997
15 years 6 months ago
Packets or ports: the decisions of IP switching
One of the most important network elements in the Internet are the routers which do relaying of IP packets. Because of growth of the Internet routers currently experience serious ...
Mika Ilvesmäki, Kalevi Kilkki, Marko Luoma