Sciweavers

5056 search results - page 208 / 1012
» Network Coding Theory
Sort
View
SAGA
2007
Springer
15 years 9 months ago
Probabilistic Techniques in Algorithmic Game Theory
We consider applications of probabilistic techniques in the framework of algorithmic game theory. We focus on three distinct case studies: (i) The exploitation of the probabilistic...
Spyros C. Kontogiannis, Paul G. Spirakis
MMMACNS
2005
Springer
15 years 8 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
COMCOM
2000
73views more  COMCOM 2000»
15 years 2 months ago
On video coding algorithms with application level QoS guarantees
To transfer video streams with the application level QoS (Quality of Service) guarantees on the end-to-end transfer delay and the video quality, the coding algorithm and parameter...
Naoki Wakamiya, Masayuki Murata, Hideo Miyahara
CEC
2008
IEEE
15 years 9 months ago
An approach to intrusion detection by means of idiotypic networks paradigm
Abstract— In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDIS), that aims at dealing with large scale network attacks feat...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
IPPS
2008
IEEE
15 years 9 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...