Sciweavers

1118 search results - page 190 / 224
» Hybrid possibilistic networks
Sort
View
DIALM
1999
ACM
127views Algorithms» more  DIALM 1999»
14 years 1 months ago
The performance of query control schemes for the zone routing protocol
—In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information ...
Zygmunt J. Haas, Marc R. Pearlman
MOBICOM
1999
ACM
14 years 1 months ago
An Architecture for a Secure Service Discovery Service
The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an interesting ...
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, ...
CHI
2007
ACM
14 years 29 days ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CSREASAM
2006
13 years 10 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
IAAI
2003
13 years 10 months ago
A Probabilistic Vehicle Diagnostic System Using Multiple Models
In addition to being accurate, it is important that diagnostic systems for use in automobiles also have low development and hardware costs. Model-based methods have shown promise ...
Matthew L. Schwall, J. Christian Gerdes, Bernard B...