Sciweavers

1639 search results - page 229 / 328
» Degree-constrained network flows
Sort
View
149
Voted
MOBIQUITOUS
2005
IEEE
15 years 6 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...
111
Voted
RAID
2004
Springer
15 years 6 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
92
Voted
ISCC
2003
IEEE
15 years 6 months ago
A Framework for Wireless Ad hoc Networks with a Quasi-Guaranteed Minimum System Lifetime
In previous work, we thoroughly studied the intricate problem of energy conservation in wireless ad hoc networks. Consequently, we proposed a novel framework, namely Quasi-Guarante...
Ahmed M. Safwat, Hossam S. Hassanein, Hussein T. M...
LCN
2003
IEEE
15 years 6 months ago
Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations
In active and programmable networks, packet processing could be accomplished in the router within the data path. For efficient resource allocation in such networks, the packet sch...
Fariza Sabrina, Sanjay Jha
HUMAN
2003
Springer
15 years 6 months ago
Admission Control for TCP Connections in QoS IP Network
The paper describes a new admission control (AC) algorithm for greedy TCP connections. The algorithm has passed positive tests in preproduction QoS IP network [2], developed inside...
Wojciech Burakowski, Halina Tarasiuk