Sciweavers

5234 search results - page 858 / 1047
» Simulation of Computer Network Attacks
Sort
View
137
Voted
WIOPT
2005
IEEE
15 years 9 months ago
Iterated Local Optimization for Minimum Energy Broadcast
In our prior work, we presented a highly effective local search based heuristic algorithm called the Largest Expanding Sweep Search (LESS) to solve the minimum energy broadcast (M...
Intae Kang, Radha Poovendran
WSTST
2005
Springer
15 years 9 months ago
Hybrid Neurocomputing for Breast Cancer Detection
Breast cancer is one of the major tumor related cause of death in women. Various artificial intelligence techniques have been used to improve the diagnoses procedures and to aid t...
Yuehui Chen, Ajith Abraham, Bo Yang
NETGAMES
2003
ACM
15 years 9 months ago
Priority-based distribution trees for application-level multicast
In this paper, we propose a novel multicast routing algorithm that is based on application-level priorities and network characteristics: The application may specify an individual ...
Jürgen Vogel, Jörg Widmer, Dirk Farin, M...
ICNP
2002
IEEE
15 years 9 months ago
pTCP: An End-to-End Transport Layer Protocol for Striped Connections
The TCP transport layer protocol is designed for connections that traverse a single path between the sender and receiver. However, there are several environments in which multiple...
Hung-Yun Hsieh, Raghupathy Sivakumar
ICNP
2002
IEEE
15 years 9 months ago
A Lightweight, Robust P2P System to Handle Flash Crowds
Abstract— Internet flash crowds (a.k.a. hot spots) are a phenomenon that result from a sudden, unpredicted increase in an on-line object’s popularity. Currently, there is no e...
Angelos Stavrou, Dan Rubenstein, Sambit Sahu