Sciweavers

1647 search results - page 245 / 330
» Distributing private data in challenged network environments
Sort
View
AHSWN
2006
206views more  AHSWN 2006»
15 years 4 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 10 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
ATAL
2004
Springer
15 years 9 months ago
Resource Allocation in the Grid Using Reinforcement Learning
One of the main challenges in Grid computing is efficient allocation of resources (CPU-hours, network bandwidth, etc.) to the tasks submitted by users. Due to the lack of centrali...
Aram Galstyan, Karl Czajkowski, Kristina Lerman
ICOIN
2004
Springer
15 years 9 months ago
A Routing Strategy for Metropolis Vehicular Communications
One of the major issues that affect the performance of mobile ad hoc networks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promising routin...
Genping Liu, Bu-Sung Lee, Boon-Chong Seet, Chuan H...
ML
2000
ACM
150views Machine Learning» more  ML 2000»
15 years 3 months ago
Adaptive Retrieval Agents: Internalizing Local Context and Scaling up to the Web
This paper discusses a novel distributed adaptive algorithm and representation used to construct populations of adaptive Web agents. These InfoSpiders browse networked information ...
Filippo Menczer, Richard K. Belew