Sciweavers

1692 search results - page 322 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
JMLR
2006
113views more  JMLR 2006»
14 years 11 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
KBSE
2007
IEEE
15 years 6 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
MSN
2005
Springer
165views Sensor Networks» more  MSN 2005»
15 years 5 months ago
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
In the area of wireless mobile communication, minimizing energy consumption as well as maximizing data throughput in medium access control (MAC) layer is a very important research ...
Changsu Suh, Young-Bae Ko, Jai-Hoon Kim
AROBOTS
2004
127views more  AROBOTS 2004»
14 years 11 months ago
Hormone-Inspired Self-Organization and Distributed Control of Robotic Swarms
The control of robot swarming in a distributed manner is a difficult problem because global behaviors must emerge as a result of many local actions. This paper uses a bio-inspired ...
Wei-Min Shen, Peter M. Will, Aram Galstyan, Cheng-...
JNW
2007
113views more  JNW 2007»
14 years 11 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...