Sciweavers

2500 search results - page 294 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
SENSYS
2006
ACM
15 years 4 months ago
Lazy cross-link removal for geographic routing
Geographic techniques promise highly scalable any-toany routing in wireless sensor networks. In one thread of research on geographic routing, researchers have explored robust, dis...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...
SPAA
2010
ACM
15 years 3 months ago
Brief announcement: byzantine agreement with homonyms
In this work, we address Byzantine agreement in a message passing system with homonyms, i.e. a system with a number l of authenticated identities that is independent of the total ...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
IWAN
2000
Springer
15 years 2 months ago
Performance of Active Multicast Congestion Control
This paper aims to provide insight into the behavior of congestion control mechanisms for reliable multicast protocols. A multicast congestion control based on active networks has ...
Marifeli Sedano, Arturo Azcorra, María Cald...
ICAI
2008
15 years 6 days ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
FLAIRS
2003
15 years 4 days ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter