Sciweavers

1737 search results - page 181 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
144
Voted
AHSWN
2010
102views more  AHSWN 2010»
15 years 5 months ago
A Framework for the Capacity Evaluation of Multihop Wireless Networks?
The specific challenges of multihop wireles networks lead to a strong research effort on efficient protocols design where the offered capacity is a key objective. More specifically...
Hervé Rivano, Fabrice Theoleyre, Fabrice Va...
CIRA
2007
IEEE
130views Robotics» more  CIRA 2007»
15 years 11 months ago
Compliant Formation Control of a Multi-Vehicle System
— This research identifies a strategy called compliant formation control, which may be used to coordinate the navigational structure of a team of autonomous vehicles. This techni...
Erica Z. MacArthur, Carl D. Crane III
CCS
2008
ACM
15 years 7 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
KDD
2003
ACM
269views Data Mining» more  KDD 2003»
16 years 5 months ago
Maximizing the spread of influence through a social network
Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technolog...
David Kempe, Jon M. Kleinberg, Éva Tardos
WORM
2003
15 years 6 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley