Sciweavers

1314 search results - page 225 / 263
» New Approaches for Virtual Private Network Design
Sort
View
114
Voted
TEC
2002
166views more  TEC 2002»
15 years 1 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
BROADNETS
2007
IEEE
15 years 8 months ago
Reconsidering power management
— Power-management approaches have been widely studied in an attempt to conserve idling energy by allowing nodes to switch to a low-power sleep mode. However, due to the inherent...
Cigdem Sengul, Albert F. Harris III, Robin Kravets
RAID
2004
Springer
15 years 7 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
CEC
2009
IEEE
15 years 5 months ago
A model for intrinsic artificial development featuring structural feedback and emergent growth
Abstract--A model for intrinsic artificial development is introduced in this paper. The proposed model features a novel mechanism where growth emerges, rather than being triggered ...
Martin Trefzer, Tüze Kuyucu, Julian Francis M...
108
Voted
NSDI
2010
15 years 3 months ago
Contracts: Practical Contribution Incentives for P2P Live Streaming
PPLive is a popular P2P video system used daily by millions of people worldwide. Achieving this level of scalability depends on users making contributions to the system, but curre...
Michael Piatek, Arvind Krishnamurthy, Arun Venkata...