Sciweavers

2014 search results - page 264 / 403
» Network Management Challenges for Next Generation Networks
Sort
View
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
15 years 6 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
DBISP2P
2004
Springer
111views Database» more  DBISP2P 2004»
15 years 7 months ago
Processing and Optimization of Complex Queries in Schema-Based P2P-Networks
Peer-to-Peer infrastructures are emerging as one of the important data management infrastructures in the World Wide Web. So far, however, most work has focused on simple P2P networ...
Hadhami Dhraief, Alfons Kemper, Wolfgang Nejdl, Ch...
136
Voted
CN
2008
127views more  CN 2008»
15 years 2 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
CONEXT
2008
ACM
15 years 3 months ago
Observing slow crustal movement in residential user traffic
It is often argued that rapidly increasing video content along with the penetration of high-speed access is leading to explosive growth in the Internet traffic. Contrary to this p...
Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira ...
ICAC
2009
IEEE
15 years 8 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...