Sciweavers

1368 search results - page 82 / 274
» A Hybrid Reputation Model Based on the Use of Organizations
Sort
View
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 3 months ago
Buffer Occupation Probability of Trace-Driven Background Streams in Hybrid Simulation
— In this paper, numerical calculation schemes of the buffer occupation probability for a buffer which is fed by a large number of independent and stationary sources are evaluate...
Ben Lauwens, Bart Scheers, Antoine Van de Capelle
CAV
2008
Springer
130views Hardware» more  CAV 2008»
13 years 11 months ago
A Hybrid Type System for Lock-Freedom of Mobile Processes
We propose a type system for lock-freedom in the -calculus, which guarantees that certain communications will eventually succeed. Distinguishing features of our type system are: it...
Naoki Kobayashi, Davide Sangiorgi
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 2 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
POLICY
2007
Springer
14 years 3 months ago
Handling Dynamic Organizational Change with Community-Based Policy Management
Policy-based management (PBM) aims to provide flexibility in the management of resources so as to readily reflect changing business goals. However, as organizations increasingly u...
Kevin Feeney, David Lewis, Vincent Wade
CEEMAS
2007
Springer
14 years 3 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...