Sciweavers

3146 search results - page 608 / 630
» Efficient Consequence Finding
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 7 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
COMCOM
2008
103views more  COMCOM 2008»
13 years 7 months ago
Fast reroute with pre-established bypass tunnel in MPLS
Internet IP networks utilize multiple-protocol label switching (MPLS), which provides a reliable label switched path (LSP). LSP in MPLS domains needs one label at each Ingress lab...
Wei Kuang Lai, Zhen Chang Zheng, Chen-Da Tsai
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 7 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CORR
2010
Springer
170views Education» more  CORR 2010»
13 years 7 months ago
Slow Adaptive OFDMA Systems Through Chance Constrained Programming
Adaptive orthogonal frequency division multiple access (OFDMA) has recently been recognized as a promising technique for providing high spectral efficiency in future broadband wire...
William Weiliang Li, Ying Jun Zhang, Anthony Man-C...
CORR
2008
Springer
213views Education» more  CORR 2008»
13 years 7 months ago
Between conjecture and memento: shaping a collective emotional perception of the future
Abstract Microblogging is a form of online communication by which users broadcast brief text updates, also known as tweets, to the public or a selected circle of contacts. A varieg...
Alberto Pepe, Johan Bollen