Sciweavers

2968 search results - page 186 / 594
» Network Programming Using PLAN
Sort
View
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ICPP
2008
IEEE
15 years 9 months ago
Mapping Algorithms for Multiprocessor Tasks on Multi-Core Clusters
In this paper, we explore the use of hierarchically structured multiprocessor tasks (M-tasks) for programming multi-core cluster systems. These systems often have hierarchically s...
Jörg Dümmler, Thomas Rauber, Gudula R&uu...
PERCOM
2007
ACM
16 years 2 months ago
Expressing Sensor Network Interaction Patterns Using Data-Driven Macroprogramming
Wireless Sensor Networks (WSNs) are increasingly being employed as a key building block of pervasive computing infrastructures, owing to their ability to be embedded within the re...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
ICN
2007
Springer
15 years 9 months ago
ABW - Short-Timescale Passive Bandwidth Monitoring
ct Bandwidth usage monitoring is important for network troubleshooting and planning. Traditionally, used bandwidth is computed from router interface byte counters read by SNMP. Thi...
Sven Ubik, Demetres Antoniades, Arne Øsleb&...
GECCO
2008
Springer
154views Optimization» more  GECCO 2008»
15 years 4 months ago
Cooperative network construction using digital germlines
This paper describes a study in the evolution of cooperative behavior, specifically the construction of communication networks, through digital evolution and multilevel selection...
David B. Knoester, Philip K. McKinley, Charles Ofr...