Sciweavers

273 search results - page 32 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
CCGRID
2003
IEEE
15 years 5 months ago
Criticality-based Analysis and Design of Unstructured Peer-to-Peer Networks as "Complex Systems"
— Due to enormous complexity of the unstructured peer-to-peer networks as large-scale, self-configure, and dynamic systems, the models used to characterize these systems are eit...
Farnoush Banaei Kashani, Cyrus Shahabi
ICCS
2003
Springer
15 years 5 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
GRID
2008
Springer
15 years 24 days ago
On correlated availability in Internet-distributed systems
As computer networks rapidly increase in size and speed, Internet-distributed systems such as P2P, volunteer computing, and Grid systems are increasingly common. A precise and acc...
Derrick Kondo, Artur Andrzejak, David P. Anderson
ANCS
2007
ACM
15 years 3 months ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
ADHOCNETS
2009
Springer
15 years 6 months ago
Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis
Node clustering and data aggregation are popular techniques to reduce energy consumption in large WSNs and a large body of literature has emerged describing various clustering prot...
Anna Förster, Alexander Förster, Amy L. ...