Sciweavers

7134 search results - page 1217 / 1427
» A comparative study of map use
Sort
View
102
Voted
SIGCOMM
2004
ACM
15 years 6 months ago
Comparison of routing metrics for static multi-hop wireless networks
Routing protocols for wireless ad hoc networks have traditionally focused on finding paths with minimum hop count. However, such paths can include slow or lossy links, leading to...
Richard Draves, Jitendra Padhye, Brian Zill
WOSP
2004
ACM
15 years 6 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
ASIACRYPT
2004
Springer
15 years 6 months ago
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
We study the class of masking based domain extenders for UOWHFs. Our first contribution is to show that any correct masking based domain extender for UOWHF which invokes the compr...
Palash Sarkar
ATAL
2004
Springer
15 years 6 months ago
Embedded Agents for District Heating Management
We investigate the applicability of multi-agent systems as a control approach for district heating systems. The consumers, i.e., the heat exchange systems, in current district hea...
Paul Davidsson, Fredrik Wernstedt
55
Voted
CEAS
2004
Springer
15 years 6 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li
« Prev « First page 1217 / 1427 Last » Next »