Sciweavers

1063 search results - page 159 / 213
» Order and Negation as Failure
Sort
View
ICWMC
2006
IEEE
15 years 5 months ago
An Ant-based Routing Protocol using Unidirectional Links for Heterogeneous Mobile Ad-Hoc Networks
Because of the heterogeneity in radio transceiver capabilities and influence of surroundings, unidirectional links arise in wireless mobile ad-hoc networks. Since most of existin...
Taro Maekawa, Harumasa Tada, Naoki Wakamiya, Makot...
IEEECIT
2006
IEEE
15 years 5 months ago
Design of a Reliable NAND Flash Software for Mobile Device
Flash memory in various embedded systems such as the backing memory is frequently used in an active type of RFID reader. Because batteries are used in a shifting environment and s...
TaeHoon Kim, KwangMu Shin, TaeHoon Lee, KiDong Jun...
INFOCOM
2006
IEEE
15 years 5 months ago
MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis
— Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 5 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
CLUSTER
2005
IEEE
15 years 5 months ago
Service Level Agreement based Allocation of Cluster Resources: Handling Penalty to Enhance Utility
Jobs submitted into a cluster have varying requirements depending on user-specific needs and expectations. Therefore, in utility-driven cluster computing, cluster Resource Manage...
Chee Shin Yeo, Rajkumar Buyya