Sciweavers

383 search results - page 77 / 77
» Designing Capital-Intensive Systems with Architectural and O...
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
ATAL
2006
Springer
14 years 15 days ago
RPD-enabled agents teaming with humans for multi-context decision making
Team decision making under stress involving multiple contexts is an extremely challenging issue faced by various real world application domains. This research is targeted at coupl...
Xiaocong Fan, Bingjun Sun, Shuang Sun, Michael D. ...
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...