Sciweavers

9210 search results - page 1812 / 1842
» Analyzing Real-Time Systems
Sort
View
CN
2008
98views more  CN 2008»
13 years 9 months ago
Description and simulation of dynamic mobility networks
During the last decade, the study of large scale complex networks has attracted a substantial amount of attention and works from several domains: sociology, biology, computer scie...
Antoine Scherrer, Pierre Borgnat, Eric Fleury, Jea...
COMCOM
2008
145views more  COMCOM 2008»
13 years 9 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMCOM
2008
120views more  COMCOM 2008»
13 years 9 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
CORR
2010
Springer
125views Education» more  CORR 2010»
13 years 9 months ago
Critical control of a genetic algorithm
Based on speculations coming from statistical mechanics and the conjectured existence of critical states, I propose a simple heuristic in order to control the mutation probability...
Raphaël Cerf
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 9 months ago
Discovering potential user browsing behaviors using custom-built apriori algorithm
Most of the organizations put information on the web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay a whi...
Sandeep Singh Rawat, Lakshmi Rajamani
« Prev « First page 1812 / 1842 Last » Next »