Sciweavers

1664 search results - page 177 / 333
» Making a Case for Multi-Agent Systems
Sort
View
147
Voted
TNC
2004
120views Education» more  TNC 2004»
15 years 6 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
JSAC
2006
79views more  JSAC 2006»
15 years 5 months ago
On the performance of multicarrier DS-CDMA with imperfect power control and variable spreading factors
Multicarrier direct-sequence code-division multiple access (MC-DS-CDMA) becomes an attractive technique for the future fourth-generation (4G) wireless system because it can flexibl...
Li-Chun Wang, Chih-Wen Chang
INFOCOM
2009
IEEE
15 years 11 months ago
Distributed Storage Management of Evolving Files in Delay Tolerant Ad Hoc Networks
— This work focuses on a class of distributed storage systems whose content may evolve over time. Each component or node of the storage system is mobile and the set of all nodes ...
Eitan Altaian, Philippe Nain, Jean-Claude Bermond
CASES
2009
ACM
15 years 11 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...
FGCN
2008
IEEE
161views Communications» more  FGCN 2008»
15 years 11 months ago
The Development of Software Pricing Schemata and Its Application to Software Industry in Korea
The purpose of this this research is to suggest comprehensive pricing schemata that software developers can use in the integrated state of software uses. To do so, we have reviewe...
Youngsik Kwak, Yunkyung Lee, Yoonsik Kwak