Sciweavers

141 search results - page 8 / 29
» Intrusion Tolerance in Wireless Environments: An Experimenta...
Sort
View
ISADS
2003
IEEE
15 years 5 months ago
Message Logging and Recovery in Wireless CORBA Using Access Bridge
The emerging mobile wireless environment poses exciting challenges for distributed fault tolerant (FT) computing. This paper proposes a message loggingand recovery protocol on the...
Xinyu Chen, Michael R. Lyu
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
ICASSP
2010
IEEE
15 years 19 days ago
A survey of implementation efforts and experimental design for cooperative communications
Design and analysis of cooperative communication schemes based upon modeling and simulation exist in large quantities in the research literature. Despite this fact, there have bee...
Glenn Bradford, J. Nicholas Laneman
106
Voted
EUROSYS
2009
ACM
15 years 9 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
MOBIHOC
2009
ACM
16 years 1 months ago
Fault tolerant target tracking in sensor networks
In this paper, we present a Gaussian mixture model based approach to capture the spatial characteristics of any target signal in a sensor network, and further propose a temporally...
Min Ding, Xiuzhen Cheng