Sciweavers

2645 search results - page 503 / 529
» Autonomous security for autonomous systems
Sort
View
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 5 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
ECAI
2000
Springer
15 years 4 months ago
Achieving Coordination through Combining Joint Planning and Joint Learning
There are two major approaches to activity coordination in multiagent systems. First, by endowing the agents with the capability to jointly plan, that is, to jointly generate hypot...
Gerhard Weiss
EURODAC
1994
IEEE
209views VHDL» more  EURODAC 1994»
15 years 3 months ago
MOS VLSI circuit simulation by hardware accelerator using semi-natural models
- The accelerator is destined to circuit-level simulation of digital and analog/digital MOS VLSI'c containing of up to 100 thousand transistors (with 16 Mb RAM host-machine). ...
Victor V. Denisenko
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 3 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
ICDCS
2010
IEEE
15 years 3 months ago
Guaranteeing BGP Stability with a Few Extra Paths
Abstract—Policy autonomy exercised by Autonomous Systems (ASes) on the Internet can result in persistent oscillations in Border Gateway Protocol, the Internet’s inter-domain ro...
Rachit Agarwal, Virajith Jalaparti, Matthew Caesar...