메뉴 건너뛰기




Volumn 27, Issue 3, 2006, Pages 422-427

New algorithm of net layer trouble-shooting-RRBFNN

Author keywords

Computer system architecture; Fault diagnosis; Radial basis function; Rough set

Indexed keywords

ALGORITHMS; CLASSIFICATION (OF INFORMATION); COMPUTER ARCHITECTURE; EVALUATION; FAILURE ANALYSIS; MAPPING; MATHEMATICAL MODELS; NEURAL NETWORKS; RADIAL BASIS FUNCTION NETWORKS; REDUNDANCY; ROUGH SET THEORY; STABILITY;

EID: 33747058766     PISSN: 10001093     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (12)
  • 1
    • 0033886774 scopus 로고    scopus 로고
    • A new approach to model the stationary behavior of TCP connections
    • Tel Aviv, Israel, CA: IEEE Computer Society
    • Caserri C, Meo M. A new approach to model the stationary behavior of TCP connections[C]. Proc IEEE INFOCOM2000, Tel Aviv, Israel, CA: IEEE Computer Society, 2000: 367-375.
    • (2000) Proc IEEE INFOCOM2000 , pp. 367-375
    • Caserri, C.1    Meo, M.2
  • 2
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of End-to-End congestion control in the Internet
    • Floyd S, Fall K. Promoting the use of End-to-End congestion control in the Internet[J]. IEEE/ACM Trans Networking, 1999, 7(4): 458-472.
    • (1999) IEEE/ACM Trans Networking , vol.7 , Issue.4 , pp. 458-472
    • Floyd, S.1    Fall, K.2
  • 5
    • 0035792737 scopus 로고    scopus 로고
    • Fuzzy congnitive maps for decision support in an intelligent intrusion system
    • Tel Aviv, Israel, CA: IEEE Computer Society
    • Siraj A, Bridges S M. Fuzzy congnitive maps for decision support in an intelligent intrusion system[C]. ISFA World Congress and 20th NAFIPS International Conference, Tel Aviv, Israel, CA: IEEE Computer Society, 2001: 2165-2170.
    • (2001) ISFA World Congress and 20th NAFIPS International Conference , pp. 2165-2170
    • Siraj, A.1    Bridges, S.M.2
  • 6
    • 0032645074 scopus 로고    scopus 로고
    • TCP/IP security threats and attack methods
    • Harris B, Hunt R. TCP/IP security threats and attack methods[J]. Computer Communications, 1999, 22(10): 885-897.
    • (1999) Computer Communications , vol.22 , Issue.10 , pp. 885-897
    • Harris, B.1    Hunt, R.2
  • 7
    • 0037235052 scopus 로고    scopus 로고
    • Autonomic service deployment in networks
    • Haas R, Droz P, Stiller B. Autonomic service deployment in networks[J]. IBM Systems Journal, 2003, 42(1): 150-164.
    • (2003) IBM Systems Journal , vol.42 , Issue.1 , pp. 150-164
    • Haas, R.1    Droz, P.2    Stiller, B.3
  • 8
    • 33646701050 scopus 로고    scopus 로고
    • Fuzzy min-max neural network: From classification to regression
    • Tagliaferri R, Eleuteri A, Meneganti M, et al. Fuzzy min-max neural network: from classification to regression[J]. Soft Computing, 2001, 32(5): 59-76.
    • (2001) Soft Computing , vol.32 , Issue.5 , pp. 59-76
    • Tagliaferri, R.1    Eleuteri, A.2    Meneganti, M.3
  • 10
    • 0038532960 scopus 로고    scopus 로고
    • Neural network collection
    • Chinese source
    • ZHOU Zhi-hua. Neural network collection[J]. Chinese Journal of Computers, 2002, 25(1): 1-8. (in Chinese)
    • (2002) Chinese Journal of Computers , vol.25 , Issue.1 , pp. 1-8
    • Zhou, Z.-H.1
  • 11
    • 0038166620 scopus 로고    scopus 로고
    • Knowledge reductions in inconsistent information systems
    • Chinese source
    • ZHANG Wen-xiu, MI Ju-sheng, Chen Yang. Knowledge reductions in inconsistent information systems[J]. Chinese Journal of Computers, 2003, 26(1): 12-18. (in Chinese)
    • (2003) Chinese Journal of Computers , vol.26 , Issue.1 , pp. 12-18
    • Zhang, W.-X.1    Mi, J.-S.2    Chen, Y.3
  • 12
    • 33747073432 scopus 로고    scopus 로고
    • KDD cup 1999 data
    • http://kdd.ics.uci.edu/databases/kddcup99kddcup99.html
    • Wiederhold G, Larson J A. KDD cup 1999 data: [EB/OL]. 2002(2002-08-15)[2004-12-05]. http://kdd.ics.uci.edu/databases/kddcup99kddcup99.html.
    • (2004)
    • Wiederhold, G.1    Larson, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.