Sciweavers

2200 search results - page 262 / 440
» Hop Integrity in Computer Networks
Sort
View
149
Voted
ICES
2003
Springer
111views Hardware» more  ICES 2003»
15 years 9 months ago
Spiking Neural Networks for Reconfigurable POEtic Tissue
Abstract. Vertebrate and most invertebrate organisms interact with their environment through processes of adaptation and learning. Such processes are generally controlled by comple...
Jan Eriksson, Oriol Torres, Andrew Mitchell, Gayle...
CSE
2009
IEEE
15 years 8 months ago
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks
—In this paper we propose a clustering and routing scheme for wireless sensor networks based on a self-organizing approach. The aim of this approach is for nodes to perform an in...
Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata
144
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
133
Voted
CRITIS
2007
15 years 5 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
123
Voted
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 3 months ago
Bandwidth Modeling and Estimation in Peer to Peer Networks
Recent studies have shown that the majority of today's internet traffic is related to Peer to Peer (P2P) traffic. The study of bandwidth in P2P networks is very important. Bec...
Kiarash Mizanian, Mehdi Vasef, Morteza Analoui