Sciweavers

1569 search results - page 283 / 314
» Using active networks technology for dynamic QoS
Sort
View
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CCR
2007
110views more  CCR 2007»
14 years 9 months ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...
WISE
2002
Springer
15 years 2 months ago
UTML: Unified Transaction Modeling Language
Web transactions may be complex, composed of several sub-transactions accessing different resources including legacy systems. They may also have complex semantics. To deal with co...
Nektarios Gioldasis, Stavros Christodoulakis
IJISEC
2007
119views more  IJISEC 2007»
14 years 9 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
IMC
2009
ACM
15 years 4 months ago
Triangle inequality variations in the internet
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...