Sciweavers

819 search results - page 59 / 164
» Acknowledgements
Sort
View
HOLOMAS
2007
Springer
14 years 3 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
CSMR
2006
IEEE
14 years 2 months ago
Object-Oriented Legacy System Trace-based Logic Testing
When reengineering legacy systems, it is crucial to assess if the legacy behavior has been preserved or how it changed due to the reengineering effort. Ideally if a legacy system ...
Stéphane Ducasse, Tudor Gîrba, Roel W...
EUROMICRO
2006
IEEE
14 years 2 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
GLOBECOM
2006
IEEE
14 years 2 months ago
Analysis of Unfairness between TCP Uplink and Downlink Flows in Wi-Fi Hot Spots
Abstract— This paper focuses on the unfairness problem between TCP uplink and downlink flows in the 802.11 Wi-Fi hot spots and shows that the service is prone to be unfair. The ...
Eun-Chan Park, Dong-Young Kim, Chong-Ho Choi
ICMCS
2006
IEEE
121views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Packet Loss Modeling for Perceptually Optimized 3D Transmission
Transmissions over wireless and other unreliable networks can lead to packet loss. An area that has received limited research attention is how to tailor multimedia information tak...
Irene Cheng, Lihang Ying, Anup Basu