Sciweavers

2686 search results - page 275 / 538
» Parallel object monitors
Sort
View
IAT
2007
IEEE
15 years 10 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
ICC
2007
IEEE
166views Communications» more  ICC 2007»
15 years 10 months ago
Dynamic Optimization of Secure Mobile Sensor Networks: A Genetic Algorithm
— We propose a reduced-complexity genetic algorithm for secure and dynamic deployment of resource constrained multi-hop mobile sensor networks. Mobility and security are relative...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen
ICWMC
2006
IEEE
15 years 10 months ago
Future Hybrid Cellular-Broadcasting Systems for Multimedia Multicasting
— This paper discusses hybrid cellular-broadcasting systems as an alternative for future delivery of wireless multimedia multicast services. A resource management framework is pr...
Aurelian Bria
132
Voted
APSEC
2005
IEEE
15 years 10 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
ETFA
2005
IEEE
15 years 10 months ago
A dispatching mechanism providing REMPLI applications with QoS
The main objective of the REMPLI project1 is to develop a distributed infrastructure suitable for realtime monitoring and control of energy distribution and consumption. PLC techn...
R. Brito, Yeqiong Song