Sciweavers

2747 search results - page 387 / 550
» Network externalities in software systems
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 10 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 4 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
IWCMC
2010
ACM
14 years 3 months ago
CRABSS: CalRAdio-Based advanced Spectrum Scanner for cognitive networks
The first step required by the process of cognition is the intelligent observation of the environment that surrounds the actors of such a process. We present the CalRAdio-Based a...
Riccardo Manfrin, Luca Boscato, Andrea Zanella, Mi...
EUROSYS
2008
ACM
14 years 7 months ago
DepSpace: a byzantine fault-tolerant coordination service
The tuple space coordination model is one of the most interesting coordination models for open distributed systems due to its space and time decoupling and its synchronization pow...
Alysson Neves Bessani, Eduardo Adílio Pelin...
ICCD
2002
IEEE
103views Hardware» more  ICCD 2002»
14 years 7 months ago
A Stream Processor Development Platform
We describe a hardware and software platform for developing streaming applications. Programmers write stream programs in high-level languages, and a set of software tools maps the...
Ben Serebrin, John D. Owens, Chen H. Chen, Stephen...