Sciweavers

1043 search results - page 138 / 209
» Monitoring Service
Sort
View
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
15 years 9 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
CONEXT
2006
ACM
15 years 9 months ago
Learning for accurate classification of real-time traffic
Accurate network traffic classification is an important task. We intend to develop an intelligent classification system by learning the types of service inside a network flow usin...
Wei Li, Andrew W. Moore
DEXAW
2005
IEEE
117views Database» more  DEXAW 2005»
15 years 9 months ago
DMW - A Middleware for Digital Rights Management in Peer-to-Peer Networks
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
Praveen Kumar, G. Sridhar, V. Sridhar, R. Gadh
DSD
2005
IEEE
70views Hardware» more  DSD 2005»
15 years 9 months ago
Vital Signs Remote Management System for PDAs
It is a challenge to provide an efficient healthcare service for countries with continental dimensions. Mechanisms for a more efficient and better attendance of patients are nec...
Danielly Cruz, Edna Barros
ICAC
2005
IEEE
15 years 9 months ago
The Case for Automated Planning in Autonomic Computing
Computing systems have become so complex that the IT industry recognizes the necessity of deliberative methods to make these systems self-configuring, self-healing, selfoptimizin...
Biplav Srivastava, Subbarao Kambhampati