Sciweavers

3082 search results - page 598 / 617
» its 2004
Sort
View
114
Voted
ISSA
2004
15 years 2 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
93
Voted
NETWORKING
2004
15 years 2 months ago
Fairness Issues in Bus-Based Optical Access Networks
Packet-based optical access ring is becoming a promising solution in metropolitan networks. Its performance depends mainly on how optical resource sharing takes place among the dif...
Nizar Bouabdallah, André-Luc Beylot, Guy Pu...
94
Voted
NETWORKING
2004
15 years 2 months ago
Pricing Differentiated Services: A Game-Theoretic Approach
The goal of this paper is to study pricing of differentiated services and its impact on the choice of service priority at equilibrium. We consider both TCP connections as well as n...
Eitan Altman, Dhiman Barman, Rachid El Azouzi, Dav...
82
Voted
NETWORKING
2004
15 years 2 months ago
Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals
: IEEE 802.11 exhibits both short-term and long-term unfairness [15]. The short-term fairness automatically gives rise to long-term fairness, but not vice versa [11]. When we thoro...
Zhifei Li, Sukumar Nandi, Anil K. Gupta
139
Voted
NETWORKING
2004
15 years 2 months ago
Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks
This paper proposes a novel reliable multicast transport protocol for multi-hop, wireless ad hoc networks (or MANETs). To recover from the different types of losses that may occur ...
Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, S...