Sciweavers

198 search results - page 34 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
113
Voted
MOBISYS
2003
ACM
16 years 3 months ago
Reservations for Conflict Avoidance in a Mobile Database System
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...
Nuno M. Preguiça, José Legatheaux Ma...
117
Voted
CN
2006
84views more  CN 2006»
15 years 3 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
15 years 10 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ï¬...
Marek Lipczak, Evangelos E. Milios
108
Voted
WSC
1998
15 years 4 months ago
Timed Petri Nets as a Verification Tool
This paper presents Timed Petri Nets (TPN) as an analytical approach for verification of computerized queueing network simulation models at steady state. It introduces a generic a...
Miryam Barad
128
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Link throughput of multi-channel opportunistic access with limited sensing
—We aim to characterize the maximum link throughput of a multi-channel opportunistic communication system. The states of these channels evolve as independent and identically dist...
Keqin Liu, Qing Zhao