Sciweavers

1742 search results - page 240 / 349
» A Framework for Network Modeling in Prolog
Sort
View
CRITIS
2007
15 years 6 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
CORR
2008
Springer
88views Education» more  CORR 2008»
15 years 4 months ago
Coding Strategies for Noise-free Relay Cascades with Half-Duplex Constraint
Abstract--Two types of noise-free relay cascades are investigated. Networks where a source communicates with a distant receiver via a cascade of half-duplex constrained relays, and...
Tobias Lutz, Christoph Hausl, Ralf Koetter
MOBIHOC
2012
ACM
13 years 6 months ago
Spatial spectrum access game: nash equilibria and distributed learning
A key feature of wireless communications is the spatial reuse. However, the spatial aspect is not yet well understood for the purpose of designing efficient spectrum sharing mecha...
Xu Chen, Jianwei Huang
DSN
2002
IEEE
15 years 9 months ago
On the Placement of Software Mechanisms for Detection of Data Errors
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between ...
Martin Hiller, Arshad Jhumka, Neeraj Suri
DSN
2009
IEEE
15 years 8 months ago
Evaluating the impact of Undetected Disk Errors in RAID systems
Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, Undetected Disk Errors (UDEs) also known as silent data corruption events, b...
Eric Rozier, Wendy Belluomini, Veera Deenadhayalan...