Sciweavers

8080 search results - page 161 / 1616
» From Computer Networks to Agent Networks
Sort
View
168
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
114
Voted
HICSS
2009
IEEE
178views Biometrics» more  HICSS 2009»
15 years 10 months ago
Applying Multi-Layered Analysis Framework on the Public Sector ICT Provision: An Illustration from a Municipal Wireless Network
As technology develops, local governments are increasingly becoming involved in providing municipal wireless service. However, many obstacles exist in municipal wireless provision...
Myungjae Kwak, Thomas A. Horan, Hana Oh
133
Voted
JNW
2008
101views more  JNW 2008»
15 years 3 months ago
Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks
Using two-hop neighborhood information, we present the hybrid activation multiple access (HAMA) protocol for time-division channel access scheduling in ad hoc networks with omni-di...
Lichun Bao, J. J. Garcia-Luna-Aceves
129
Voted
ECUMN
2007
Springer
15 years 9 months ago
End-to-End Distance Computation in Grid Environment by NDS, the Network Distance Service
This article presents a novel method for computing distances between hosts in a computational Grid. Our method allows to represent the cost to achieve any operation involving some...
Julien Gossa, Jean-Marc Pierson
153
Voted
EUROPAR
2003
Springer
15 years 8 months ago
Support for Personal and Service Mobility in Ubiquitous Computing Environments
This paper describes an agent-based architecture that extends personal mobility to ubiquitous environment. A software agent, running on a portable device, leverages the existing se...
Khalil El-Khatib, N. Hadibi, Gregor von Bochmann