Sciweavers

2349 search results - page 266 / 470
» Performing time-sensitive network experiments
Sort
View
DSN
2002
IEEE
15 years 9 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
ICPP
1999
IEEE
15 years 8 months ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida
SEKE
1993
Springer
15 years 8 months ago
A Neural Net-Based Approach to Software Metrics
Software metrics provide effective methods for characterizing software. Metrics have traditionally been composed through the definition of an equation, but this approach is limite...
Gary D. Boetticher, K. Srinivas, David Eichmann
WCNC
2010
IEEE
15 years 8 months ago
Modeling IEEE 802.11 DCF System Dynamics
—Experiments show that IEEE 802.11 DCF system exhibits unstable behavior in the congestion onset load range where the system starts to become saturated. This phenomenon is not we...
Zhenzhen Cao, Ren Ping Liu, Xun Yang, Yang Xiao
ICANN
2007
Springer
15 years 8 months ago
Fuzzy Classifiers Based on Kernel Discriminant Analysis
In this paper, we discuss fuzzy classifiers based on Kernel Discriminant Analysis (KDA) for two-class problems. In our method, first we employ KDA to the given training data and ca...
Ryota Hosokawa, Shigeo Abe