The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of centre selection in radial basis function neural networks (RBFNNs) is re-examined and tackled through a cooperative game theoretic perspective. By resorting to the notion of Shapley value, the approach ranks candidate centres (modelled as game players) for the RBFNN??s hidden layer based on a sampled estimation of their marginal contribution to the cross-validation training error. Results...
We consider VANET applications which divide urban areas into geographical regions among which aggregated information by area should be disseminated. In each region, a circular area called emitter and receiver center (ERC) is used for sending and receiving messages. Vehicles within each ERC send and receive messages to and from vehicles inside the other ERCs, defining a multiple geocast routing problem...
In the last few years, we have seen that the attack and P2P traffic has increased significantly. Currently, P2P traffic represents a significant portion of Internet traffic and the attacks represent a serious threat to computer systems. The approach presented here uses a small number of statistical discriminators and cluster analysis to identify such kind of traffics, obtaining results that are better...
Attacks represent a serious threat to a network environment, and therefore need to be promptly detected. New attack types, of which detection systems may not even be aware, are the most difficult to detect. Currently, the available methods are mainly based on signature or learning algorithms and generally can not detect these new attacks. The approach presented here uses a small number of statistical...
In the last years, we have seen that the use of P2P applications has increased significantly and currently they represent a significant portion of the Internet traffic. In consequence of this growth, P2P traffic characterization and identification are becoming increasingly important for network administrators and designers. However, this identification is not simple. Nowadays, P2P applications explicitly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.