Sciweavers

3717 search results - page 267 / 744
» Architecture-Based Design of Computer Based Systems
Sort
View
RAID
2005
Springer
15 years 10 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
PPSN
2004
Springer
15 years 10 months ago
Evolution of Voronoi-Based Fuzzy Controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. One of the most successful methods to auto...
Carlos Kavka, Marc Schoenauer
155
Voted
MOBIHOC
2003
ACM
15 years 10 months ago
Mobility modelling and trajectory prediction for cellular networks with mobile base stations
This paper provides mobility estimation and prediction for a variant of GSM network which resembles an adhoc wireless mobile network where base stations and users are both mobile....
Pubudu N. Pathirana, Andrey V. Savkin, Sanjay Jha
HPDC
2010
IEEE
15 years 5 months ago
A GPU accelerated storage system
Massively multicore processors, like, for example, Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditio...
Abdullah Gharaibeh, Samer Al-Kiswany, Sathish Gopa...
EUC
2006
Springer
15 years 8 months ago
Impact of Node Cheating on Gossip-Based Protocol
Gossip-based protocol has been widely adopted by many large-scale multicast applications. In this paper, we study the impact of node cheating on decentralized gossip-based protocol...
Nan Zhang, Yuanchun Shi, Bin Chang