Sciweavers

474 search results - page 85 / 95
» Empirical Evaluation of Techniques for Measuring Available B...
Sort
View
INFOCOM
2007
IEEE
14 years 3 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
INFOCOM
2006
IEEE
14 years 2 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
COMPSAC
2005
IEEE
14 years 2 months ago
Self-Configuring Communication Middleware Model for Multiple Network Interfaces
Communication middleware such as MuniCluster provides highlevel communication mechanisms for networked applications through hiding the low-level communication details from the app...
Nader Mohamed
EWCBR
2004
Springer
14 years 2 months ago
Maintaining Case-Based Reasoning Systems: A Machine Learning Approach
Over the years, many successful applications of case-based reasoning (CBR) systems have been developed in different areas. The performance of CBR systems depends on several factor...
Niloofar Arshadi, Igor Jurisica
ISW
2004
Springer
14 years 2 months ago
Survey on the Technological Aspects of Digital Rights Management
Abstract. Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has ...
William Ku, Chi-Hung Chi