Sciweavers

2500 search results - page 248 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
76
Voted
SAC
2004
ACM
15 years 4 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
GECCO
2004
Springer
132views Optimization» more  GECCO 2004»
15 years 4 months ago
Optimizing Topology and Parameters of Gene Regulatory Network Models from Time-Series Experiments
Abstract. In this paper we address the problem of finding gene regulatory networks from experimental DNA microarray data. Different approaches to infer the dependencies of gene r...
Christian Spieth, Felix Streichert, Nora Speer, An...
DAC
2003
ACM
15 years 4 months ago
A timing-accurate modeling and simulation environment for networked embedded systems
The design of state-of-the-art, complex embedded systems requires the capability of modeling and simulating the complex networked environment in which such systems operate. This i...
Franco Fummi, Giovanni Perbellini, Paolo Gallo, Ma...
86
Voted
SENSYS
2003
ACM
15 years 4 months ago
Tracking a moving object with a binary sensor network
In this paper we examine the role of very simple and noisy sensors for the tracking problem. We propose a binary sensor model, where each sensor’s value is converted reliably to...
Javed A. Aslam, Zack J. Butler, Florin Constantin,...
COLCOM
2009
IEEE
15 years 3 months ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño