Sciweavers

11112 search results - page 1964 / 2223
» Computing Stuttering Simulations
Sort
View
IJNSEC
2008
129views more  IJNSEC 2008»
15 years 4 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
CCE
2007
15 years 4 months ago
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
142
Voted
IJNSEC
2008
132views more  IJNSEC 2008»
15 years 4 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
IJRR
2008
80views more  IJRR 2008»
15 years 4 months ago
Motion Planning for Legged Robots on Varied Terrain
This paper studies the quasi-static motion of large legged robots that have many degrees of freedom. While gaited walking may suffice on easy ground, rough and steep terrain requi...
Kris K. Hauser, Timothy Bretl, Jean-Claude Latombe...
IJAHUC
2006
128views more  IJAHUC 2006»
15 years 4 months ago
Avoid 'void' in geographic routing for data aggregation in sensor networks
: Wireless sensor networks have attracted great attention in research and industrial development due to its fast-growing application potentials. New techniques must be developed fo...
Shigang Chen, Guangbin Fan, Jun-Hong Cui
« Prev « First page 1964 / 2223 Last » Next »