Results 31 to 40 of about 15,339 (156)

Cooperation between expert knowledge and data mining discovered knowledge: Lessons learned [PDF]

open access: yes, 2012
Expert systems are built from knowledge traditionally elicited from the human expert. It is precisely knowledge elicitation from the expert that is the bottleneck in expert system construction. On the other hand, a data mining system, which automatically
Adomavicius   +20 more
core   +2 more sources

Intrusion detection routers: Design, implementation and evaluation using an experimental testbed [PDF]

open access: yes, 2006
In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed.
Chan, EYK   +20 more
core   +2 more sources

Topological Phases: An Expedition off Lattice

open access: yes, 2011
Motivated by the goal to give the simplest possible microscopic foundation for a broad class of topological phases, we study quantum mechanical lattice models where the topology of the lattice is one of the dynamical variables.
Ambjorn   +19 more
core   +1 more source

Weight Try-Once-Discard Protocol-Based L_2 L_infinity State Estimation for Markovian Jumping Neural Networks with Partially Known Transition Probabilities

open access: yes, 2023
It was the L_2 L_infinity performance index that for the first time is initiated into the discussion on state estimation of delayed MJNNs with with partially known transition probabilities, which provides a more general promotion for the estimation error.The WTOD protocol is adopted to dispatch the sensor nodes so as to effectively alleviate the ...
Zou, Cong, Chen, Wei
openaire   +2 more sources

Sketching Cuts in Graphs and Hypergraphs [PDF]

open access: yes, 2014
Sketching and streaming algorithms are in the forefront of current research directions for cut problems in graphs. In the streaming model, we show that $(1-\epsilon)$-approximation for Max-Cut must use $n^{1-O(\epsilon)}$ space; moreover, beating $4/5 ...
Kogan, Dmitry, Krauthgamer, Robert
core  

Self-organization of Nodes using Bio-Inspired Techniques for Achieving Small World Properties

open access: yes, 2011
In an autonomous wireless sensor network, self-organization of the nodes is essential to achieve network wide characteristics. We believe that connectivity in wireless autonomous networks can be increased and overall average path length can be reduced by
Agarwal, Rachit   +5 more
core   +3 more sources

Phase-Remapping Attack in Practical Quantum Key Distribution Systems

open access: yes, 2006
Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain ...
B. Qi   +11 more
core   +2 more sources

AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications [PDF]

open access: yes, 2008
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine ...
Araujo Pinto, Álvaro   +5 more
core   +1 more source

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds

open access: yes, 2015
With the growing incidents of flash crowds and sophisticated DDoS attacks mimicking benign traffic, it becomes challenging to protect Internet-based services solely by differentiating attack traffic from legitimate traffic. While fair-sharing schemes are
Hsiao, Hsu-Chun   +7 more
core   +1 more source

Introduction to study and simulation of low rate video coding schemes [PDF]

open access: yes
During this period, the development of simulators for the various HDTV systems proposed to the FCC were developed. These simulators will be tested using test sequences from the MPEG committee.

core   +1 more source

Home - About - Disclaimer - Privacy