Sciweavers

209 search results - page 21 / 42
» Effective Shadow Detection in Traffic Monitoring Application...
Sort
View
ITNG
2008
IEEE
14 years 2 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates
COMCOM
2004
149views more  COMCOM 2004»
13 years 7 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin
AEI
2010
136views more  AEI 2010»
13 years 7 months ago
Bridging the sense-reasoning gap: DyKnow - Stream-based middleware for knowledge processing
nizing multiple forms of information and knowledge processing on different levels of abstraction in a structured and principled manner. We propose knowledge processing middleware a...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
MOBICOM
2000
ACM
14 years 1 days ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
ASPLOS
2010
ACM
13 years 11 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...