Sciweavers

96 search results - page 17 / 20
» On Using Probabilistic Forwarding to Improve HEC-Based Data ...
Sort
View
CCS
2010
ACM
13 years 6 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
NTMS
2009
IEEE
14 years 1 months ago
Performance Study of Node Placement for Congestion Control in Wireless Sensor Networks
— Performance of Wireless Sensor Networks (WSNs) can be affected when the network is deployed under different topologies. In this paper we present a performance study of congesti...
Vasos Vassiliou, Charalambos Sergiou
MOBISYS
2008
ACM
14 years 6 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
SOSP
2001
ACM
14 years 3 months ago
Resilient Overlay Networks
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance with...
David G. Andersen, Hari Balakrishnan, M. Frans Kaa...
EUROPAR
2006
Springer
13 years 10 months ago
SEER: Scalable Energy Efficient Relay Schemes in MANETs
In Mobile Ad Hoc Networks (MANETs), broadcasting is widely used to support many applications. Several adaptive broadcast schemes have been proposed to reduce the number of rebroadc...
Lin-Fei Sung, Cheng-Lin Wu, Yi-Kai Chiang, Shyh-In...