Sciweavers

1464 search results - page 183 / 293
» Process-Oriented Collective Operations
Sort
View
IEEEIAS
2009
IEEE
14 years 5 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
INFOCOM
2009
IEEE
14 years 5 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
INFOCOM
2009
IEEE
14 years 5 months ago
On Passive One-Way Loss Measurements Using Sampled Flow Statistics
—The ability to scalably measure one-way packet loss across different network paths is vital to IP network management. However, the effectiveness of active-measurement techniques...
Yu Gu, Lee Breslau, Nick G. Duffield, Subhabrata S...
AGS
2009
Springer
14 years 5 months ago
Design of a Decision Maker Agent for a Distributed Role Playing Game - Experience of the SimParc Project
This paper addresses an ongoing experience in the design of an artificial agent taking decisions in a role playing game populated by human agents and by artificial agents. At fi...
Jean-Pierre Briot, Alessandro Sordoni, Eurico Vasc...
EMSOFT
2009
Springer
14 years 5 months ago
NANDFS: a flexible flash file system for RAM-constrained systems
NANDFS is a flash file system that exposes a memory-performance tradeoff to system integrators. The file system can be configured to use a large amount of RAM, in which case i...
Aviad Zuck, Ohad Barzilay, Sivan Toledo