Sciweavers

4376 search results - page 664 / 876
» Data Management in Sensor Networks
Sort
View
129
Voted
IAW
2003
IEEE
15 years 8 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
140
Voted
TPDS
2008
262views more  TPDS 2008»
15 years 3 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino
CHI
2008
ACM
16 years 3 months ago
The associative pda 2.0
In this paper I describe the Associative PDA 2.0, a mobile system for Personal Information Management (PIM), based on an associative information network. In addition to associate ...
Eileen Falke
127
Voted
NOSSDAV
2005
Springer
15 years 9 months ago
A traffic model for the Xbox game Halo 2
This paper analyses the traffic characteristics of, and proposes a traffic model for, the Xbox game Halo 2. Our goal is to help players and network providers to estimate the amoun...
Sebastian Zander, Grenville J. Armitage
INFOCOM
1992
IEEE
15 years 7 months ago
An Assessment of State and Lookup Overhead in Routers
The current Internet is based on a stateless (datagram) architecture. However, many recent proposals rely on the maintenance of state information within network routers, leading t...
Deborah Estrin, Danny J. Mitzel