Sciweavers

3257 search results - page 57 / 652
» networking 2004
Sort
View
ASIASIM
2004
Springer
15 years 3 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
SAPIR
2004
Springer
15 years 3 months ago
Probabilistic Routing in Intermittently Connected Networks
We consider the problem of routing in intermittently connected networks. In such networks there is no guarantee that a fully connected path between source and destination exist at...
Anders Lindgren, Avri Doria, Olov Schelén
AUSFORENSICS
2004
14 years 11 months ago
Implementing network defence using deception in a wireless honeypot
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
Suen Yek
BROADNETS
2004
IEEE
15 years 1 months ago
Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
We consider the throughput/delay tradeoffs for scheduling data transmissions in a mobile ad hoc network. To reduce delays in the network, each user sends redundant packets along mu...
Michael J. Neely, Eytan Modiano
GECCO
2004
Springer
166views Optimization» more  GECCO 2004»
15 years 3 months ago
Evolutionary Ensemble for Stock Prediction
We propose a genetic ensemble of recurrent neural networks for stock prediction model. The genetic algorithm tunes neural networks in a two-dimensional and parallel framework. The ...
Yung-Keun Kwon, Byung Ro Moon