Sciweavers

5234 search results - page 882 / 1047
» Simulation of Computer Network Attacks
Sort
View
133
Voted
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 10 months ago
A particle swarm algorithm for symbols detection in wideband spatial multiplexing systems
This paper explores the application of the particle swarm algorithm for a NP-hard problem in the area of wireless communications. The specific problem is of detecting symbols in a...
Adnan Ahmed Khan, Muhammad Naeem, Syed Ismail Shah
PAM
2007
Springer
15 years 10 months ago
Neuro-fuzzy Processing of Packet Dispersion Traces for Highly Variable Cross-Traffic Estimation
Cross-traffic data rate over the tight link of a path can be estimated using different active probing packet dispersion techniques. Many of these techniques send large amounts of p...
Marco A. Alzate, Néstor M. Peña, Mig...
161
Voted
CCGRID
2006
IEEE
15 years 9 months ago
GridFTP-APT: Automatic Parallelism Tuning Mechanism for Data Transfer Protocol GridFTP
GridFTP has been used as a data transfer protocol to effectively transfer a large volume of data in Grid computing. GridFTP supports a feature called parallel data transfer that i...
Takeshi Ito, Hiroyuki Ohsaki, Makoto Imase
101
Voted
DSN
2005
IEEE
15 years 9 months ago
Probabilistic QoS Guarantees for Supercomputing Systems
Supercomputing systems must be able to reliably and efficiently complete their assigned workloads, even in the presence of failures. This paper proposes a system that allows the ...
Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, ...
138
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Systems Support for Pervasive Query Processing
Database queries, in particular, event-driven continuous queries, are useful for many pervasive computing applications, such as video surveillance. In order to enable these applic...
Wenwei Xue, Qiong Luo, Lionel M. Ni