نتایج جستجو برای: the slaves
تعداد نتایج: 16052815 فیلتر نتایج به سال:
Identifying the sources of a Distributed Denial-ofService (DDoS) attack is among the hardest problems in the Internet security area. Use of reflectors in a DDoS attack makes the problem particularly difficult as the actual sources of attack (slaves) are camouflaged. In this paper we propose a modification to the traceback of Multiple Hash DERM [13], an effective deterrent against DDoS attacks. ...
In this paper, we propose a hybrid master/slave approach to optimization problems on the basis of estimation of distribution algorithms (EDAs) and genetic algorithms (GAs). The master process estimates the probability distribution of the search space on the basis of the non-dependency model at each iteration and sends probability vectors to the slaves. The slaves use the vectors to generate a n...
The unique advantages of Bluetooth such as low power consumption capability, cheap hardware interfaces and easy set-up offer new application areas. This is a reason why Bluetooth is even considered for a Service Oriented Architectures (SOAs) consisting of a large number of resource-constraint devices. Although several proposals are available for reducing power consumption for intra-piconet comm...
Bluetooth is a promising technology aiming at supporting short-range wireless communication. To achieve the advantage of simplicity and low-power, the master/slave model is used. However, this model has some drawbacks since no direct link exists between any two slaves in a piconet. Consequently, slave-to-slave communications must go through the master, and the master has to use extra bandwidth ...
This paper presents a parallel algorithm for calculating the eight-directional (D8) up-slope contributing area in digital elevation models (DEMs). In contrast with previous algorithms, which have potentially unbounded inter-node communications, the algorithm presented here realizes strict bounds on the number of inter-node communications. Those bounds in turn allow D8 attributes to be processed...
Tooth mutilation existed in sub-Saharan Africa, and was found among slaves transported to the New World. A small number of mutilation cases have been identified in early New World "Negro" skeletons from the Caribbean and Florida. The skeletal evidence alone precludes determining if the individuals were Africanor American-born, but limited ethnohistorical data suggested the former. This hypothes...
During the last quarter of the 17th century, African slaves were “imported” into the Americas in unprecedented numbers. This enlargement of the slave population represented a deep commitment to, and investment in, slavery. Slavery was to become commonplace and thus demanded moral, religious, and legal justification. Systematic colonization utilized European legal systems, which rationalized the...
This paper proposes an iterative parallel genetic algorithm with biased initial population to solve large-scale combinatorial optimization problems. The proposed scheme employs a master-slave collaboration in which the master node manages searched space of slave nodes and assigns seeds to generate initial population to slaves for their restarting of evolution process. Our approach allows us as ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید