Sciweavers

2092 search results - page 374 / 419
» Dynamically Distributed Query Evaluation
Sort
View
IAW
2003
IEEE
15 years 5 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
INFOCOM
2003
IEEE
15 years 5 months ago
EMPOWER: A Network Emulator for Wireless and Wireline Networks
— The increasing need of protocol development environments and network performance evaluation tools gives rise to the research of flexible, scalable, and accurate network emulato...
Pei Zheng, Lionel M. Ni
GPC
2010
Springer
15 years 4 months ago
SLA-Driven Automatic Bottleneck Detection and Resolution for Read Intensive Multi-tier Applications Hosted on a Cloud
Abstract. A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, the current SLAs offered by cloud providers do no...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...
MOBICOM
1999
ACM
15 years 4 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins
IJCAI
1997
15 years 1 months ago
Middle-Agents for the Internet
Like middle-men in physical commerce, middleagents support the flow of information in electronic commerce, assisting in locating and connecting the ultimate information provider ...
Keith Decker, Katia P. Sycara, Mike Williamson