Sciweavers

483 search results - page 28 / 97
» Experiences with Capsule-Based Active Networking
Sort
View
IJON
2007
99views more  IJON 2007»
13 years 8 months ago
Criticality of avalanche dynamics in adaptive recurrent networks
In many studies of self-organized criticality (SOC), branching processes were used to model the dynamics of the activity of the system during avalanches. This mathematical simpliļ...
Anna Levina, Udo Ernst, J. Michael Herrmann
TEC
2002
89views more  TEC 2002»
13 years 8 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
STTT
2008
89views more  STTT 2008»
13 years 8 months ago
Modelling defence logistics networks
Military logistics concerns the activities required to support operational forces. It encompasses the storage and distribution of materiel, management of personnel and the provisio...
Guy Edward Gallasch, Nimrod Lilith, Jonathan Billi...
JSAC
2011
137views more  JSAC 2011»
12 years 11 months ago
A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks
ā€”Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
Yen-Cheng Lai, Phone Lin, Wanjiun Liao, Chung-Min ...
GPEM
2010
134views more  GPEM 2010»
13 years 7 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...