Sciweavers

2413 search results - page 211 / 483
» Understanding the problem
Sort
View
CCR
2008
99views more  CCR 2008»
15 years 4 months ago
The resource pooling principle
Since the ARPAnet, network designers have built localized mechanisms for statistical multiplexing, load balancing, and failure resilience, often without understanding the broader ...
Damon Wischik, Mark Handley, Marcelo Bagnulo Braun
CORR
2010
Springer
96views Education» more  CORR 2010»
15 years 4 months ago
The theory and calculus of aliasing
A theory, graphical notation, mathematical calculus and implementation for finding whether two given expressions can, at execution time, denote references attached to the same obje...
Bertrand Meyer
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 4 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
IJAR
2006
133views more  IJAR 2006»
15 years 4 months ago
Extraction of similarity based fuzzy rules from artificial neural networks
A method to extract a fuzzy rule based system from a trained artificial neural network for classification is presented. The fuzzy system obtained is equivalent to the correspondin...
Carlos Javier Mantas, José Manuel Puche, J....
IJBC
2006
91views more  IJBC 2006»
15 years 4 months ago
Limit Cycles for Generalized Abel Equations
This paper deals with the problem of finding upper bounds on the number of periodic solutions of a class of one-dimensional non-autonomous differential equations: those with the r...
Armengol Gasull, Antoni Guillamon