Sciweavers

5234 search results - page 802 / 1047
» Simulation of Computer Network Attacks
Sort
View
EUROPAR
2007
Springer
15 years 10 months ago
Content-Based Publish/Subscribe Using Distributed R-Trees
Publish/subscribe systems provide a useful paradigm for selective data dissemination and most of the complexity related to addressing and routing is encapsulated within the network...
Silvia Bianchi, Pascal Felber, Maria Gradinariu
ISNN
2007
Springer
15 years 10 months ago
Discriminant Analysis with Label Constrained Graph Partition
In this paper, a space partition method called “Label Constrained Graph Partition” (LCGP) is presented to solve the Sample-InterweavingPhenomenon in the original space. We firs...
Peng Guan, Yaoliang Yu, Liming Zhang
IWANN
2007
Springer
15 years 10 months ago
A Software Framework for Tuning the Dynamics of Neuromorphic Silicon Towards Biology
This paper presents configuration methods for an existing neuromorphic hardware and shows first experimental results. The utilized mixed-signal VLSI1 device implements a highly a...
Daniel Brüderle, Andreas Grübl, Karlhein...
133
Voted
IPCCC
2006
IEEE
15 years 10 months ago
Towards a framework for worm-defense evaluation
Computer worms are a serious problem. Much research has been done to detect and contain worms. One major deficiency in most research is that the claims are supported by theoretic...
Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N....
LCN
2006
IEEE
15 years 10 months ago
Modelling Voice Communication in Disaster Area Scenarios
This paper deals with voice communication models for disaster area scenarios. The goal is to design models that can be used to generate realistic push to talk traffic for single ...
Nils Aschenbruck, Michael Gerharz, Matthias Frank,...