Sciweavers

911 search results - page 87 / 183
» The Semantics of Event Prevention
Sort
View
MOBISEC
2009
Springer
15 years 4 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
INFOCOM
2008
IEEE
15 years 4 months ago
A Backup Route Aware Routing Protocol - Fast Recovery from Transient Routing Failures
Abstract— As the Internet becomes the critical information infrastructure for both personal and business applications, survivable routing protocols need to be designed that maint...
Feng Wang, Lixin Gao
CEC
2005
IEEE
15 years 3 months ago
On improving genetic programming for symbolic regression
This paper reports an improvement to genetic programming (GP) search for the symbolic regression domain, based on an analysis of dissimilarity and mating. GP search is generally di...
Steven Gustafson, Edmund K. Burke, Natalio Krasnog...
ICAI
2003
14 years 11 months ago
A Secure Agent Architecture for Sensor Networks
Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sen...
Zhaoyu Liu, Yongge Wang
CN
2010
97views more  CN 2010»
14 years 10 months ago
PCN-based measured rate termination
Overload in a packet-based network can be prevented by admitting or blocking new flows depending on its load conditions. However, overload can occur in spite of admission control ...
Michael Menth, Frank Lehrieder