Sciweavers

913 search results - page 166 / 183
» Modeling Gene Networks using Fuzzy Logic
Sort
View
DSN
2009
IEEE
13 years 5 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
COMSWARE
2007
IEEE
14 years 1 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
DAIS
2009
13 years 8 months ago
Foraging for Better Deployment of Replicated Service Components
Abstract. Our work focuses on distributed software services and their requirements in terms of system performance and dependability. We target the problem of finding optimal deploy...
Máté J. Csorba, Hein Meling, Poul E....
ALIFE
1999
13 years 7 months ago
The Creatures Global Digital Ecosystem
An arti cial life entertainment-software product called Creatures was released in Europe in late 1996 and in the United States and Japan in mid-1997. When installed on a domestic c...
Dave Cliff, Stephen Grand
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham