Sciweavers

2112 search results - page 219 / 423
» Using the Network Description Language in Optical Networks
Sort
View
TON
2012
13 years 6 months ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
124
Voted
TNN
2008
88views more  TNN 2008»
15 years 4 months ago
A New Approach to Knowledge-Based Design of Recurrent Neural Networks
Abstract-- A major drawback of artificial neural networks (ANNs) is their black-box character. This is especially true for recurrent neural networks (RNNs) because of their intrica...
Eyal Kolman, Michael Margaliot
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
15 years 10 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
DISCEX
2003
IEEE
15 years 9 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
DSOM
2005
Springer
15 years 9 months ago
Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL
Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Antonio Guerrero, Víctor A. Villagrá...