Sciweavers

6110 search results - page 168 / 1222
» Graceful Network Operations
Sort
View
139
Voted
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 6 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
15 years 6 months ago
An Individual View on Cooperation Networks
Networks utilizing modern communication technologies can offer competitive advantages to those using them wisely. But due to the existence of network effects, planning and operati...
Tim Weitzel, Daniel Beimborn, Wolfgang König
105
Voted
INFOCOM
2003
IEEE
15 years 6 months ago
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
Murali S. Kodialam, T. V. Lakshman
NCA
2003
IEEE
15 years 6 months ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross
APWEB
2003
Springer
15 years 6 months ago
Trends in Mobile Multimedia and Networks
NTT DoCoMo is the company to ”DO COmmunications over the MObile Network”. It reached 43 million subscribers in Japan, early 2003. This presentation covers the multimedia servic...
Minoru Etoh