Sciweavers

3296 search results - page 541 / 660
» Gathercast with Active Networks
Sort
View
AINA
2007
IEEE
15 years 7 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
86
Voted
CEC
2007
IEEE
15 years 7 months ago
A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols
—Nature-inspired routing protocols are becoming an active area of research. Researchers in the community follow a wn engineering philosophy: inspire, abstract, design, develop an...
Saira Zahid, Muhammad Shahzad, Syed Usman Ali, Mud...
87
Voted
CEC
2007
IEEE
15 years 7 months ago
Evolving neuromodulatory topologies for reinforcement learning-like problems
— Environments with varying reward contingencies constitute a challenge to many living creatures. In such conditions, animals capable of adaptation and learning derive an advanta...
Andrea Soltoggio, Peter Dürr, Claudio Mattius...
100
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
A Distributed Bandwidth Sharing Heuristic for Backup LSP Computation
— With the advent of MPLS, the restoration times of communications is decreased down to 50 ms by the use of preconfigured backup LSPs. To ensure there are enough resources after ...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
71
Voted
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 7 months ago
A TCP Connection Establishment Filter: Symmetric Connection Detection
— Network measurement at 10+Gbps speeds imposes many restrictions on the resource consumption of the measurement application, making any filtering of input data highly desirable...
Brad Whitehead, Chung-Horng Lung, Peter Rabinovitc...