While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
Several agent-oriented methodologies have been proposed over the last few years. Unlike the object-oriented domain and unfortunately for designers, most of the time, each methodolo...
Carole Bernon, Massimo Cossentino, Marie Pierre Gl...
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
The problem of interest is how to dynamically allocate wireless access services in a competitive market which implements a take-it-or-leave-it allocation mechanism. In this paper ...
George Lee, Steven Bauer, Peyman Faratin, John Wro...
Not all participants in a collaborative virtual environment (CVE) need to be informed of every other participant’s activities. The technique used for filtering irrelevant message...