Sciweavers

914 search results - page 85 / 183
» Lightweight scalable components
Sort
View
106
Voted
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 2 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
120
Voted
EUROPAR
2010
Springer
15 years 1 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
86
Voted
ICASSP
2010
IEEE
15 years 26 days ago
Information retrieval methods for automatic speech recognition
In this paper, we use information retrieval (IR) techniques to improve a speech recognition (ASR) system. The potential benefits include improved speed, accuracy, and scalability...
Xiaoqiang Xiao, Jasha Droppo, Alex Acero
110
Voted
TCS
2008
15 years 18 days ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
107
Voted
CN
2002
161views more  CN 2002»
15 years 15 days ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert