Sciweavers

1352 search results - page 108 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ANCS
2006
ACM
14 years 1 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
ICC
2008
IEEE
136views Communications» more  ICC 2008»
14 years 4 months ago
A Game-Theoretic Framework for Interference Management through Cognitive Sensing
A game theoretic framework is developed in this paper to facilitate inter-cell interference management through cognitive sensing distributively performed by mobile stations (MSs)....
Yingda Chen, Koon Hoo Teo, Shalinee Kishore, Jinyu...
MOBIHOC
2008
ACM
14 years 9 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
EUROMICRO
2005
IEEE
14 years 3 months ago
QoS-aware Mobile Middleware for Video Streaming
State-of-the-art middleware and component technologies lack support for Quality of Service (QoS) management. Application developers, therefore, integrate QoS mechanisms into the a...
Sten Lundesgaard Amundsen, Ketil Lund, Carsten Gri...
CLIMA
2004
13 years 11 months ago
A New Framework for Knowledge Revision of Abductive Agents Through Their Interaction
The aim of this work is the design of a framework for the revision of knowledge in abductive reasoning agents, based on interaction. We address issues such as: how to exploit knowl...
Andrea Bracciali, Paolo Torroni