Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
It is common that Internet service hosting centres use several logical pools to assign server resources to different applications, and that they try to achieve the highest total r...
James Wen Jun Xue, Adam P. Chester, Ligang He, Ste...
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...