Sciweavers

3057 search results - page 450 / 612
» Complexity management
Sort
View
INFOCOM
2006
IEEE
15 years 8 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
IWIA
2006
IEEE
15 years 8 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
LCN
2006
IEEE
15 years 8 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
SSDBM
2006
IEEE
139views Database» more  SSDBM 2006»
15 years 8 months ago
Sampling Trajectory Streams with Spatiotemporal Criteria
Monitoring movement of high-dimensional points is essential for environmental databases, geospatial applications, and biodiversity informatics as it reveals crucial information ab...
Michalis Potamias, Kostas Patroumpas, Timos K. Sel...
VTC
2006
IEEE
152views Communications» more  VTC 2006»
15 years 8 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...