Sciweavers

1022 search results - page 123 / 205
» Challenges for Constraint Programming in Networking
Sort
View
132
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
107
Voted
IFIP
2003
Springer
15 years 5 months ago
JMS on Mobile Ad Hoc Networks
The Java Message Service (JMS) provides a standard asynchronous messaging API, which simplifies the construction of loosely coupled, distributed applications. This paper describes ...
Einar Vollset, David B. Ingham, Paul D. Ezhilchelv...
INFOCOM
2002
IEEE
15 years 5 months ago
Clock Synchronization Algorithms for Network Measurements
Abstract—Packet delay traces are important measurements for analyzing end-to-end performance and for designing traffic control algorithms in computer networks. Due to the fact t...
Li Zhang, Zhen Liu, Cathy H. Xia
113
Voted
DCOSS
2005
Springer
15 years 6 months ago
Design and Comparison of Lightweight Group Management Strategies in EnviroSuite
Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applicatio...
Liqian Luo, Tarek F. Abdelzaher, Tian He, John A. ...
113
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks
—In order to fully utilize spectrum, auction-based dynamic spectrum allocation has become a promising approach which allows unlicensed wireless users to lease unused bands from s...
Yongle Wu, Beibei Wang, K. J. Ray Liu, T. Charles ...