Sciweavers

5234 search results - page 806 / 1047
» Simulation of Computer Network Attacks
Sort
View
139
Voted
INFOCOM
1996
IEEE
15 years 8 months ago
ARIES: A Rearrangeable Inexpensive Edge-Based On-Line Steiner Algorithm
In this paper, we propose and evaluate ARIES, a heuristic for updating multicast trees dynamically in large point-to-point networks. The algorithm is based on monitoring the accum...
Fred Bauer, Anujan Varma
SIGCOMM
1993
ACM
15 years 8 months ago
The Synchronization of Periodic Routing Messages
The paper considers a network with many apparently-independent periodic processes and discusses one method by which these processes can inadvertently become synchronized. In parti...
Sally Floyd, Van Jacobson
ICANN
2007
Springer
15 years 8 months ago
A Cognitive Model That Describes the Influence of Prior Knowledge on Concept Learning
It is well known that our prior knowledge and experiences affect how we learn new concepts. Although several formal modeling attempts have been made to quantitatively describe the ...
Toshihiko Matsuka, Yasuaki Sakamoto
ICANN
2007
Springer
15 years 8 months ago
An Efficient Method for Pruning the Multilayer Perceptron Based on the Correlation of Errors
Abstract. In this paper we present a novel method for pruning redundant weights of a trained multilayer Perceptron (MLP). The proposed method is based on the correlation analysis o...
Cláudio M. S. Medeiros, Guilherme De A. Bar...
134
Voted
FLAIRS
2004
15 years 6 months ago
A Surveillance System based on Multiple Mobile Sensors
A methodology for surveillance of multiple targets through a distributed mobile sensor network is proposed in this paper. We examine coordination among sensors that monitor a rect...
K. Madhava Krishna, Henry Hexmoor, Subbarao Pasupu...