Sciweavers

3031 search results - page 474 / 607
» SNMS - Shadow Network Management System
Sort
View
134
Voted
ICAI
2008
15 years 5 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
138
Voted
CNSR
2009
IEEE
164views Communications» more  CNSR 2009»
15 years 7 months ago
DibA: An Adaptive Broadcasting Scheme in Mobile Ad Hoc Networks
Broadcasting is a vital communication mechanism in Mobile Ad Hoc Networks, as it is the key element for exchanging control packets to support some services such as management and ...
Dimitrios Liarokapis, Alireza Shahrabi, Andreas Ko...
116
Voted
FLAIRS
2006
15 years 5 months ago
Modeling Bayesian Networks for Autonomous Diagnosis of Web Services
We took an innovative approach to service level management for network enterprise systems by using integrated monitoring, diagnostics, and adaptation services in a service-oriente...
Haiqin Wang, Guijun Wang, Alice Chen, Changzhou Wa...
118
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
130
Voted
TWC
2008
176views more  TWC 2008»
15 years 3 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...