Sciweavers

1417 search results - page 265 / 284
» Adaptive mobile Ortsbestimmung
Sort
View
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 8 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
DSONLINE
2008
152views more  DSONLINE 2008»
13 years 7 months ago
Software Architecture Patterns for a Context-Processing Middleware Framework
Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...
Romain Rouvoy, Denis Conan, Lionel Seinturier
AAI
2006
126views more  AAI 2006»
13 years 7 months ago
Theory and practice of field-based motion coordination in multiagent systems
Enabling and managing coordination activities between autonomous, possibly mobile, computing entities in dynamic computing scenarios challenges traditional approaches to distribut...
Marco Mamei, Franco Zambonelli
COMSUR
2007
101views more  COMSUR 2007»
13 years 7 months ago
Fast-handoff support in IEEE 802.11 wireless networks
With the advance of wireless local area network (WLAN) technology, handoff support has become one of the most important issues in IEEE 802.11 WLANs. However, the current IEEE 802....
Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, Yang...
JCM
2008
74views more  JCM 2008»
13 years 7 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...