Sciweavers

304 search results - page 21 / 61
» Measuring the Vulnerability of Interconnection Networks in E...
Sort
View
ICARIS
2007
Springer
14 years 1 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
GLOBECOM
2009
IEEE
13 years 11 months ago
On-Chip Integrated Antenna Structures in CMOS for 60 GHz WPAN Systems
Abstract--This paper presents several on-chip antenna structures that may be fabricated with standard CMOS technology for use at millimeter wave frequencies. On-chip antennas for w...
Felix Gutierrez Jr., Kristen Parrish, Theodore S. ...
IWCMC
2010
ACM
14 years 23 days ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
DOA
2000
116views more  DOA 2000»
13 years 9 months ago
Jini Technology Applied to Railway Systems
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...
Txomin Nieva, Andreas Fabri, Abdenbi Benammour
WSC
2001
13 years 9 months ago
Simulating networks of wireless sensors
Recent advances in low-power embedded processors, radios, and micro-mechanical systems (MEMs) have made possible the development of networks of wirelessly interconnected sensors. ...
Sung Park, Andreas Savvides, Mani B. Srivastava