Sciweavers

2968 search results - page 199 / 594
» Network Programming Using PLAN
Sort
View
CSFW
2007
IEEE
15 years 9 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
GPEM
2010
134views more  GPEM 2010»
15 years 1 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
IPPS
2007
IEEE
15 years 9 months ago
Formal Analysis for Debugging and Performance Optimization of MPI
High-end computing is universally recognized to be a strategic tool for leadership in science and technology. A significant portion of high-end computing is conducted on clusters...
Ganesh Gopalakrishnan, Robert M. Kirby
SAINT
2008
IEEE
15 years 9 months ago
Variable Neighborhood Search for a Prize Collecting Capacity Constrained Connected Facility Location Problem
We present a Variable Neighborhood Search approach for a network design problem occurring in real world when the bandwidth of an existing network shall be enhanced. Using two diff...
Markus Leitner, Günther R. Raidl
ICRA
2008
IEEE
144views Robotics» more  ICRA 2008»
15 years 9 months ago
Decentralized mapping of robot-aided sensor networks
— A key problem in deploying sensor networks in real-world applications is that of mapping, i.e. determining the location of each sensor such that subsequent tasks such as tracki...
Joseph Djugash, Sanjiv Singh, Ben Grocholsky