Sciweavers

165 search results - page 29 / 33
» Conversational Model Based VoIP Traffic Generation
Sort
View
PE
2006
Springer
158views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of multiple-rate mobile ad hoc networks
Existing wireless networks usually provide multiple data transmission rates. This paper presents a simulation study on the performance of multiple-rate mobile ad hoc networks (MAN...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
INFOCOM
2010
IEEE
13 years 5 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
JSA
2000
116views more  JSA 2000»
13 years 7 months ago
Distributed vector architectures
Integrating processors and main memory is a promising approach to increase system performance. Such integration provides very high memory bandwidth that can be exploited efficientl...
Stefanos Kaxiras
AAMAS
2000
Springer
13 years 7 months ago
Synthesizing Coordination Requirements for Heterogeneous Autonomous Agents
Abstract. As agents move into ever more important applications, there is a natural growth in interest in techniques for synthesizing multiagent systems. We describe an approach for...
Munindar P. Singh