Sciweavers

1806 search results - page 246 / 362
» Autonomous Network Equipments
Sort
View
NSDI
2008
15 years 7 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
152
Voted
FLAIRS
2003
15 years 6 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
CONEXT
2009
ACM
15 years 6 months ago
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping effor...
Kai Chen, David R. Choffnes, Rahul Potharaju, Yan ...
AUTOMATICA
2008
104views more  AUTOMATICA 2008»
15 years 5 months ago
Communication constraints in the average consensus problem
The interrelationship between control and communication theory is becoming of fundamental importance in many distributed control systems, such as the coordination of a team of aut...
Ruggero Carli, Fabio Fagnani, Alberto Speranzon, S...
ICRA
2009
IEEE
207views Robotics» more  ICRA 2009»
15 years 3 months ago
Bayesian network-based behavior control for skilligent robots
A Skilligent robot must be able to learn skills autonomously to accomplish a task. "Skilligence" is the capacity of the robot to control behaviors reasonably, based on th...
Sang Hyoung Lee, Il Hong Suh