Sciweavers

34 search results - page 4 / 7
» ABSENCE: Usage-based Failure Detection in Mobile Networks
Sort
View
ISSA
2004
14 years 11 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
JBCS
2010
89views more  JBCS 2010»
14 years 4 months ago
Multicoordinated agreement for groups of agents
Agents in agreement protocols play well distinct roles. Proposers propose values to the acceptors, which will accept proposals and inform the learners so they detect that an agree...
Lásaro J. Camargos, Rodrigo Schmidt, Edmund...
GLOBECOM
2006
IEEE
15 years 4 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
MDM
2009
Springer
150views Communications» more  MDM 2009»
15 years 4 months ago
Perimeter-Based Data Replication in Mobile Sensor Networks
—This paper assumes a set of n mobile sensors that move in the Euclidean plane as a swarm. Our objectives are to explore a given geographic region by detecting spatio-temporal ev...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, M...
GLOBECOM
2007
IEEE
15 years 4 months ago
GMPLS-Based Hybrid 1+N Link Protection Over p-Cycles: Design and Performance
—In [1], the author introduced a strategy to use network coding on p-Cycles in order to provide 1+N protection for straddling connections and links against single link failures i...
Ahmed E. Kamal