Sciweavers

807 search results - page 88 / 162
» Deploying and evaluating a location-aware system
Sort
View
IAT
2007
IEEE
15 years 4 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
ISCC
2007
IEEE
15 years 4 months ago
Cost Analysis of the MBMS Multicast Mode of UMTS
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasing...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
AIMS
2007
Springer
15 years 4 months ago
IBGP Confederation Provisioning
This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the r...
Mohamed Nassar, Radu State, Olivier Festor
ANCS
2006
ACM
15 years 3 months ago
A proposed architecture for the GENI backbone platform
The GENI Project (Global Environment for Network Innovation) is a major NSF-sponsored initiative that seeks to create a national research facility to enable experimental deployment...
Jonathan S. Turner
ICDCSW
2005
IEEE
15 years 3 months ago
Performance Comparison of Distributed Architectures for Content Adaptation and Delivery of Web Resources
The increasing popularity of heterogeneous Webenabled devices and wired/wireless connections motivates the diffusion of content adaptation services that enrich the traditional Web...
Claudia Canali, Valeria Cardellini, Michele Colaja...