Sciweavers

13383 search results - page 2613 / 2677
» Abstractions from proofs
Sort
View
JSAC
2006
181views more  JSAC 2006»
13 years 10 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
JSAC
2006
93views more  JSAC 2006»
13 years 10 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
JSAT
2006
91views more  JSAT 2006»
13 years 10 months ago
Extending Existential Quantification in Conjunctions of BDDs
Abstract. We introduce new approaches intended to speed up determining the satisfiability of a given Boolean formula expressed as a conjunction of Boolean functions. A common prac...
Sean Weaver, John V. Franco, John S. Schlipf
JUCS
2006
95views more  JUCS 2006»
13 years 10 months ago
POCA : A User Distributions Algorithm in Enterprise Systems with Clustering
Abstract: As enterprises worldwide race to improve real-time management to improve productivity, customer services and flexibility, huge resources have been invested into enterpris...
Ping-Yu Hsu, Ping-Ho Ting
JUCS
2006
135views more  JUCS 2006»
13 years 10 months ago
Operational/Interpretive Unfolding of Multi-adjoint Logic Programs
Abstract: Multi-adjoint logic programming represents a very recent, extremely flexible attempt for introducing fuzzy logic into logic programming. In this setting, the execution of...
Pascual Julián, Ginés Moreno, Jaime ...
« Prev « First page 2613 / 2677 Last » Next »