1,573 Hits in 5.3 sec

Shaping the Narrative Arc: An Information-Theoretic Approach to Collaborative Dialogue [article]

Kory W. Mathewson, Pablo Samuel Castro, Colin Cherry, George Foster, Marc G. Bellemare
2019 arXiv   pre-print
Adapted from a novel Philip K. Dick (1982). Last 20 lines of director's cut movie script. 3. "The Great Dictator" Charlie Chaplin. Los Angeles, CA: United Artists (1940).  ...  We investigated reveal/conceal dynamics using three different universe models based on probabilistic topic classifiers. • Newsgroups: Using the newsgroup classification dataset, we filter out stop-words  ... 
arXiv:1901.11528v1 fatcat:77e7abhma5fufjdcc7tjoatth4

Visualizing Street Pavement Anomalies through Fog Computing V2I Networks and Machine Learning

Rogelio Bustamante-Bello, Alec García-Barba, Luis A. Arce-Saenz, Luis A. Curiel-Ramirez, Javier Izquierdo-Reyes, Ricardo A. Ramirez-Mendoza
2022 Sensors  
The system detects and classifies the main road problems or abnormal conditions in streets and avenues using Machine Learning Algorithms (MLA), comparing roughness against a flat reference.  ...  This work proposes a solution to detect anomalies in streets through state analysis using sensors within the vehicles that travel daily and connecting them to a fog-computing architecture on a V2I network  ...  Route Laps Sent Packets Total Distance [m] Route Coverage [%] First route 5 2182 1120 92.6% Second route 3 1414 997 50% Table 4 . 4 Classification of acquired data.  ... 
doi:10.3390/s22020456 pmid:35062417 pmcid:PMC8781838 fatcat:alyadzrmyvd6tljl3kkaqtsazi

Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

Andrea Baiocchi, Gianluca Maiolini, Annachiara Mingo, Daniele Goretti
2015 Journal of Computer Networks and Communications  
On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and  ...  Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks.  ...  This partition is not unique and can be obtained efficiently, for example, by using the same techniques as in ARC/PARC (Adaptive Resolution Classifier/Pruning ARC) min-max neurofuzzy classifiers [38]  ... 
doi:10.1155/2015/872326 fatcat:3anekif3xraondvafmrmuqlzl4

Real-time optimisation of access control lists for efficient Internet packet filtering

Vic Grout, John McGinn, John Davies
2007 Journal of Heuristics  
time and hence packet latency.  ...  This paper considers an optimisation problem encountered in the implementation of traffic policies on network routers, namely the ordering of rules in an access control list to minimise or reduce processing  ...  There is a close relationship between the order of the n rules in an ACL and the n arcs of the TSP, with the dependencies of the ACL denoting infeasible arcs of the TSP.  ... 
doi:10.1007/s10732-007-9019-1 fatcat:yl5jdqw5ubaabnhhiwfyaxegam

Intelligent Flow Control under a Game Theoretic Framework [chapter]

Huimin Chen, Yanda Li
2001 Telecommunications Optimization: Heuristic and Adaptive Techniques  
Some of the software for this work used the GAlib genetic algorithm package, written by Matthew Wall at the Massachusetts Institute of Technology.  ...  Acknowledgements We would like to thank Brian Turton (University of Wales), Dave Corne (Reading University), Marc Wennink (BT) and Alan Pengelly (BT) for useful comments.  ...  The first network includes all possible arcs using the labels above. The second contains ten arcs, using the same labeling scheme.  ... 
doi:10.1002/047084163x.ch17 fatcat:k63jsso4ingcjnkzrp2sljylb4

Next generation routers

H.J. Chao
2002 Proceedings of the IEEE  
It then presents several algorithms/architectures to implement IP route lookup, packet classification, and switch fabrics.  ...  Several proposed algorithms for IP route lookup and packet classification are compared in respect to their search/update speeds and storage requirements.  ...  A formal description of the rule, classifier, and packet classification is given in [35] .  ... 
doi:10.1109/jproc.2002.802001 fatcat:abbtxhetq5hwdisgdqavfgi2y4


Carol Taylor, Jim Alves-Foss
2001 Proceedings of the 2001 workshop on New security paradigms - NSPW '01  
We present the method and perform an empirical test using M_IT Lincoln Lab's data.  ...  Most current network IDS's use rule based methods of detection. This includes Bro, NSM, NFR, HetStat (states arc similar to rules), Emerald, Grids and Dids.  ...  The key would be to be able to automatically adapt the screening rules with changing conditions.  ... 
doi:10.1145/508171.508186 fatcat:koavp6oggfherin26zsgqgdmua


Carol Taylor, Jim Alves-Foss
2001 Proceedings of the 2001 workshop on New security paradigms - NSPW '01  
We present the method and perform an empirical test using M_IT Lincoln Lab's data.  ...  Most current network IDS's use rule based methods of detection. This includes Bro, NSM, NFR, HetStat (states arc similar to rules), Emerald, Grids and Dids.  ...  The key would be to be able to automatically adapt the screening rules with changing conditions.  ... 
doi:10.1145/508185.508186 fatcat:dwile57ofjaqrgnshzf5uxdj2a

Mechanisms for Resilient Video Transmission [article]

Roger Immich, Eduardo Cerqueira, Marilia curado
2018 arXiv   pre-print
A number of methods to set an adaptive amount of redundancy were used in these mechanisms, such as heuristic techniques, random neural networks, ant colony optimisation, and fuzzy logic.  ...  The advantages and drawbacks of the proposed mechanisms were demonstrated in realistic simulations using real video sequences and actual network traces.  ...  The Adaptive Cross-Layer FEC (ACFEC) mechanism uses packet-level error correction [Han et al., 2010] .  ... 
arXiv:1808.06722v1 fatcat:st3mju5poba4dh47w6tilelhte

FASHION: Fault-Aware Self-Healing Intelligent On-chip Network [article]

Pengju Ren, Michel A.Kinsy, Mengjiao Zhu, Shreeya Khadka, Mihailo Isakov, Aniruddh Ramrakhyani, Tushar Krishna, Nanning Zheng
2017 arXiv   pre-print
Using local information, SAM adapts to faults, guarantees connectivity and deadlock-free routing inside the maximal connected subgraph and keeps routing tables up-to-date.  ...  To avoid packet loss and deadlock scenarios that arise due to faults or power gating in multicore and many-core systems, the network-on-chip needs to possess resilient communication and load-balancing  ...  Criterions to identify cut elements Assuming G π = (R, L π ) is the depth-first forest of G, then the following two rules are used to classify the system nodes as cut or non-cut elements [51] .  ... 
arXiv:1702.02313v1 fatcat:jq4yi2smbjf6foqmxuvabqslue

A Register Allocation Framework for Banked Register Files with Access Constraints [chapter]

Feng Zhou, Junchao Zhang, Chengyong Wu, Zhaoqing Zhang
2005 Lecture Notes in Computer Science  
Firewall: performs ordered rule-based classification to filter out unwanted packets.  ...  This application first assign flow IDs to packets according to userspecified rules and then drop packets for specified flow IDs. The flow IDs are stored in a hash table.  ... 
doi:10.1007/11572961_22 fatcat:2akk54sppzef7m5lvpggjtghhe

Multipath optimized link state routing for mobile ad hoc networks

Jiazi Yi, Asmaa Adnane, Sylvain David, Benoît Parrein
2011 Ad hoc networks  
routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation  ...  Additional functionalities are used to adapt to the topology changes.  ...  This will make future paths tend to use different arcs. f e is used to increase the costs of the arcs that lead to vertices of the previous path P i .  ... 
doi:10.1016/j.adhoc.2010.04.007 fatcat:3spdryiykzgtzc4owlcjcag4pa

An Overview of Collision Avoidance Approaches and Network Architecture of Unmanned Aerial Vehicles (UAVs)

Ahmad H. Sawalmeh, Noor Shamsiah Othman
2018 International Journal of Engineering & Technology  
The authors in [65] proposed adaptive MAC protocol for FANETs using directional antennas.  ...  When congestion occurs TCP will cut packets amount to half and then begins again network probing by increasing one packet per RTT. This is efficient algorithm for low delays terrestrial networks.  ... 
doi:10.14419/ijet.v7i4.35.27395 fatcat:hf7grlsrwjazxh2qfbkewswvee

Flow Polyhedra and Resource Constrained Project Scheduling Problems

Alain Quilliot, Hélène Toussaint
2012 Reserche operationelle  
Next it states several structural results related to connectivity and to cut management.  ...  In case the problem is set according to a dynamic point of view, authors most often propose priority rule based algorithms, (see [7, 62] ).  ...  , the insertion process does not involve any Cut, but a specific arc subset E: part of the flow which runs along an arc [x, y] of E is redirected along the arcs [x, z 0 ] and [z 0 , y] in order to first  ... 
doi:10.1051/ro/2012021 fatcat:lbwhqomheff3rilvswke3fqcqq

Parsing silhouettes: The short-cut rule

Manish Singh, Gregory D. Seyranian, Donald D. Hoffman
1999 Perception & Psychophysics  
In this paper, we propose the slwrt-cut rule, which states that, other things being equal, human vision prefers to use the shortest possible cuts to parse silhouettes.  ...  The minima rule for silhouettes (Hoffman & Richards, 1984) defines boundary points at which to parse but does not tell how to use these points to cut silhouettes and, therefore, does not tell what the  ...  Adapted with permission.  ... 
doi:10.3758/bf03205536 pmid:10370334 fatcat:a7uu2z26qffw5m42i2g4bb3mhi
« Previous Showing results 1 — 15 out of 1,573 results