Sciweavers

948 search results - page 129 / 190
» Analysis of SITA policies
Sort
View
CCGRID
2006
IEEE
15 years 6 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
HICSS
2006
IEEE
180views Biometrics» more  HICSS 2006»
15 years 6 months ago
Knowledge Dynamics in Regional Economies: A Research Framework
This paper addresses challenges associated with the dynamics of knowledge in clusters and regional networks. It develops a conceptual framework, a methodology and a research agend...
Ramon O'Callaghan, Rafel Andreu
SEW
2006
IEEE
15 years 5 months ago
Qualitative Modeling for Requirements Engineering
Acquisition of “quantitative” models of sufficient accuracy to enable effective analysis of requirements tradeoffs is hampered by the slowness and difficulty of obtaining su...
Tim Menzies, Julian Richardson
ICNP
2005
IEEE
15 years 5 months ago
Expected Convergence Properties of BGP
Border Gateway Protocol (BGP) is the de facto standard used for interdomain routing. Since packet forwarding may not be possible until stable routes are learned, it is not only cr...
Ramesh Viswanathan, Krishan K. Sabnani, Robert J. ...
EMSOFT
2005
Springer
15 years 5 months ago
Communication strategies for shared-bus embedded multiprocessors
Abstract— This paper explores the problem of efficiently ordering interprocessor communication operations in both statically and dynamically-scheduled multiprocessors for iterat...
Neal K. Bambha, Shuvra S. Bhattacharyya