Sciweavers

2275 search results - page 292 / 455
» A Deployment System for Pervasive Computing
Sort
View
IPOM
2009
Springer
15 years 11 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
ICPP
2008
IEEE
15 years 11 months ago
Overcoming Scalability Challenges for Tool Daemon Launching
: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
AIMS
2007
Springer
15 years 10 months ago
IBGP Confederation Provisioning
This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the r...
Mohamed Nassar, Radu State, Olivier Festor
ACCV
2007
Springer
15 years 10 months ago
Finding Camera Overlap in Large Surveillance Networks
Abstract. Recent research on video surveillance across multiple cameras has typically focused on camera networks of the order of 10 cameras. In this paper we argue that existing sy...
Anton van den Hengel, Anthony R. Dick, Henry Detmo...
ICN
2007
Springer
15 years 10 months ago
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks
— In this paper, we use the Markov Decision Process (MDP) technique to find the optimal code allocation policy in High-Speed Downlink Packet Access (HSDPA) networks. A discrete ...
Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadar...