Sciweavers

6689 search results - page 118 / 1338
» A Network Security Monitor
Sort
View
AGENTS
2000
Springer
14 years 2 months ago
Tools for Developing and Monitoring Agents in Distributed Multi-Agent Systems
Before the powerful agent programming paradigm can be adopted in commercial or industrial settings, a complete environment, similar to that for other programming languages, must b...
John R. Graham, Daniel McHugh, Michael Mersic, Fos...
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 4 months ago
Subspace Methods for Network Resource Reservation Coding Processes
—This paper presents a mathematical framework for resource reservation in TCP/IP networks by invoking a dynamic system viewpoint on the congestion monitoring processes occurring ...
Alexandru Murgu
TELSYS
2010
174views more  TELSYS 2010»
13 years 4 months ago
Modelling the energy cost of a fully operational wireless sensor network
Abstract Several applications have been proposed for Wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, precision agricultur...
Waltenegus Dargie, Xiaojuan Chao, Mieso K. Denko
ICNP
2000
IEEE
14 years 2 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
ASIASIM
2004
Springer
14 years 3 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...