Sciweavers

5234 search results - page 943 / 1047
» Simulation of Computer Network Attacks
Sort
View
MLDM
2007
Springer
15 years 9 months ago
Ensemble-based Feature Selection Criteria
Recursive Feature Elimination (RFE) combined with feature ranking is an effective technique for eliminating irrelevant features when the feature dimension is large, but it is diffi...
Terry Windeatt, Matthew Prior, Niv Effron, Nathan ...
NEW2AN
2007
Springer
15 years 9 months ago
Performance Analysis of the REAchability Protocol for IPv6 Multihoming
Abstract. There is ongoing work on the IETF aimed to provide support for different flavors of multihoming configurations, such as SHIM6 for multihomed sites, multiple CoAs suppo...
Antonio de la Oliva, Marcelo Bagnulo, Alberto Garc...
APCSAC
2006
IEEE
15 years 9 months ago
Functional Unit Chaining: A Runtime Adaptive Architecture for Reducing Bypass Delays
Abstract. Bypass delays are expected to grow beyond 1ns as technology scales. These delays necessitate pipelining of bypass paths at processor frequencies above 1GHz and thus affe...
Lih Wen Koh, Oliver Diessel
ICNP
2006
IEEE
15 years 9 months ago
Scaling IP Routing with the Core Router-Integrated Overlay
— IP routing scalability is based on hierarchical routing, which requires that the IP address hierarchy be aligned with the physical topology. Both site multi-homing and switchin...
Xinyang Zhang, Paul Francis, Jia Wang, Kaoru Yoshi...
ICRA
2006
IEEE
111views Robotics» more  ICRA 2006»
15 years 9 months ago
Placement and Distributed Deployment of Sensor Teams for Triangulation based Localization
— We address the problem of placing a sensor network so as to minimize the uncertainty in estimating the position of targets. The novelty of our formulation is in the sensing mod...
Volkan Isler