Sciweavers

850 search results - page 106 / 170
» heuristics 2006
Sort
View
JNW
2006
88views more  JNW 2006»
14 years 11 months ago
A Genetic Algorithms Based Approach for Group Multicast Routing
Whereas multicast transmission in one-to-many communications allows the operator to drastically save network resources, it also makes the routing of the traffic flows more complex ...
Luca Sanna Randaccio, Luigi Atzori
JNW
2006
108views more  JNW 2006»
14 years 11 months ago
System-Level Fault Diagnosis Using Comparison Models: An Artificial-Immune-Systems-Based Approach
The design of large dependable multiprocessor systems requires quick and precise mechanisms for detecting the faulty nodes. The problem of system-level fault diagnosis is computati...
Mourad Elhadef, Shantanu Das, Amiya Nayak
JODS
2006
148views Data Mining» more  JODS 2006»
14 years 11 months ago
Discovering the Semantics of Relational Tables Through Mappings
Abstract. Many problems in Information and Data Management require a semantic account of a database schema. At its best, such an account consists of formulas expressing the relatio...
Yuan An, Alexander Borgida, John Mylopoulos
JPDC
2006
100views more  JPDC 2006»
14 years 11 months ago
An integrated admission control scheme for the delivery of streaming media
Quality of service (QoS) assurance is a major concern in media-on-demand (MoD) systems. Admission control is one of the most important issues that need to be addressed for QoS ass...
Zhonghang Xia, I-Ling Yen, Donglei Du, Peng Li
JSAC
2006
128views more  JSAC 2006»
14 years 11 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum