Sciweavers

577 search results - page 68 / 116
» Budget Feasible Mechanisms
Sort
View
DATE
2009
IEEE
131views Hardware» more  DATE 2009»
15 years 3 months ago
Optimizations of an application-level protocol for enhanced dependability in FlexRay
FlexRay [9] is an automotive standard for high-speed and reliable communication that is being widely deployed for next generation cars. The protocol has powerful errordetection me...
Wenchao Li, Marco Di Natale, Wei Zheng, Paolo Gius...
GLOBECOM
2009
IEEE
15 years 3 months ago
Inter-Gateway Cross-Layer Handoffs in Wireless Mesh Networks
—Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-s...
Weiyi Zhao, Jiang Xie
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 1 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
ICMAS
2000
15 years 1 months ago
Self-Organizing Manufacturing Control: An Industrial Application of Agent Technology
We present an auction-based approach to manufacturing control. Workpieces auction off their current task, while machines bid for tasks. When awarding a machine, a workpiece takes ...
Stefan Bussmann, Klaus Schild
PHSN
1996
15 years 1 months ago
Fully reliable multicast in heterogeneous environments
Multicast (1:N) is now supported by a number of networks and communication protocols. A problem in this context is how to provide fully reliable data transmission to the receiver ...
José Ferreira de Rezende, Andreas Mauthe, S...