Sciweavers

289 search results - page 19 / 58
» Performance Preserving Network Downscaling
Sort
View
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 5 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan
IPPS
2002
IEEE
15 years 4 months ago
Distributed Spanner with Bounded Degree for Wireless Ad Hoc Networks
In this paper, we propose a new distributed algorithm that constructs a sparse spanner subgraph of the unit disk graph efficiently for wireless ad hoc networks. It maintains a li...
Yu Wang 0003, Xiang-Yang Li
QUESTA
2008
382views more  QUESTA 2008»
14 years 11 months ago
A note on stable flow-equivalent aggregation in closed networks
We introduce the Conditional Mean Value Analysis (CMVA) algorithm, an exact solution method for product-form load-dependent closed queueing networks that provides a numerically st...
Giuliano Casale
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
15 years 5 months ago
Heuristic speciation for evolving neural network ensemble
Speciation is an important concept in evolutionary computation. It refers to an enhancements of evolutionary algorithms to generate a set of diverse solutions. The concept is stud...
Shin Ando
QUESTA
2006
101views more  QUESTA 2006»
14 years 11 months ago
Insensitive versus efficient dynamic load balancing in networks without blocking
So-called Whittle networks have recently been shown to give tight approximations for the performance of non-locally balanced networks with blocking, including practical routing pol...
Matthieu Jonckheere