نتایج جستجو برای: token based algorithm

تعداد نتایج: 3349700  

2010
Jonathan Ezekiel Alessio Lomuscio

We present an algorithm based on temporal-epistemic model checking combined with fault injection to analyse automatically the diagnosability of faults by agents in the system. We describe an implementation built on the multi-agent systems model checker MCMAS and a dedicated compiler for injecting faults into an MCMAS program. A diagnosability report is generated by the implementation which can ...

2014
Navneet Sinha Gowri Srinivasa

This paper presents an algorithm for word level language identification, named entity recognition and classification, and transliteration of Indian language words written in the Roman script to their native Devanagari script from bilingual textual data. We propose the construction of an extensive, hierarchical structured dictionary and hierarchical rule-based classifier to expedite word search ...

Journal: :Journal of Computing and Information Technology 2018

Journal: :International Journal of Computer Applications 2012

Journal: :CoRR 2005
Gianni Tedesco Uwe Aickelin

­ Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an ext...

2010
Roi Reichart Omri Abend Ari Rappoport

Clustering is a central technique in NLP. Consequently, clustering evaluation is of great importance. Many clustering algorithms are evaluated by their success in tagging corpus tokens. In this paper we discuss type level evaluation, which reflects class membership only and is independent of the token statistics of a particular reference corpus. Type level evaluation casts light on the merits o...

2012
Karine Altisen Stéphane Devismes

Scientific Context. Modern networks are very large-scale (about 100 000 nodes). Now, the more a network contains nodes, the greater the probability of failures is. Hence, today fault-tolerance is a main concern for distributed algorithm designers. In particular, since several decades, there is a growing interest for self-repairing methods. For example, (deterministic) self-stabilization [Dij74]...

2000
Lenka Carr-Motycková David A. Carr Esther Jennings

Applications based on multicasting such as real-time simulations or shared editors require that all data packets are delivered safely in a reasonably short time. Trying to assure such a high quality of service centrally, can easily overload both the network and the source. One technique to prevent this is clustering (organizing multicast group members into subgroups). We present an algorithm to...

1998
Stanislaw Ambroszkiewicz Olaf Matyja Wojciech Penczek

A process of team formation by autonomous agents in a distributed environment is presented. Since the environment is distributed, there are serious problems with communication and consistent decision making inside a team. To deal with these problems, the standard technique of token passing in a computer network is applied. The passing cycle of the token serves as the communication route. It ass...

Journal: :Digital Technical Journal 1991
Raj Jain

The performance of an FDDI LAN depends upon configuration and workload parameters such as the extent of the ring, the number of stations on the ring, the number of stations that are waiting to transmit, and the frame size. In addition, one key parameter that network managers can control to improve performance is the target token rotation time (TTRT). Analytical modeling and simulation methods w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید