Sciweavers

141 search results - page 14 / 29
» Intrusion Detection Routers: Design, Implementation and Eval...
Sort
View
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 20 days ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
MOBISYS
2008
ACM
14 years 6 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
ICNP
2009
IEEE
14 years 1 months ago
Declarative Policy-based Adaptive MANET Routing
—This paper presents the design and implementation of declarative policy-based adaptive MANET routing protocols. Our work builds upon declarative networking, a recent innovation ...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
PERCOM
2010
ACM
13 years 5 months ago
PerFallD: A pervasive fall detection system using mobile phones
Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging "baby boomers", fall dete...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
PVLDB
2010
117views more  PVLDB 2010»
13 years 5 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...