Sciweavers

2672 search results - page 386 / 535
» Testing Self-Similar Networks
Sort
View
CN
2007
179views more  CN 2007»
15 years 3 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
COR
2007
143views more  COR 2007»
15 years 3 months ago
A memetic algorithm for channel assignment in wireless FDMA systems
A new problem encoding is devised for the minimum span frequency assignment problem in wireless communications networks which is compact and general. Using the new encoding, which...
Sung-Soo Kim, Alice E. Smith, Jong-Hyun Lee
118
Voted
JCIT
2008
94views more  JCIT 2008»
15 years 3 months ago
Finding Semantic Errors in the Rule-base of Production Systems, and Reasoning with Insufficient Input Data Petri-net-based Appro
Two simple but practical production systems are modeled using Petri Nets. Petri-net models are very useful in finding semantic errors like generalization error and missing conditi...
Hong-Youl Lee
115
Voted
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 3 months ago
A Training based Distributed Non-Coherent Space-Time Coding Strategy
— In this paper, differential unitary space-time coding and non-coherent space-time coding for the training based approach of Kim and Tarokh are addressed. For this approach, nec...
G. Susinder Rajan, B. Sundar Rajan
MLDM
2008
Springer
15 years 3 months ago
Distributed Monitoring of Frequent Items
Monitoring frequently occuring items is a recurring task in a variety of applications. Although a number of solutions have been proposed there has been few to address the problem i...
Robert Fuller, Mehmed M. Kantardzic