Sciweavers

657 search results - page 102 / 132
» Recovering architectural assumptions
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
CASSIS
2005
Springer
14 years 3 months ago
Mobile Resource Guarantees and Policies
This paper introduces notions of resource policy for mobile code to be run on smart devices, to integrate with the proof-carrying code architecture of the Mobile Resource Guarantee...
David Aspinall, Kenneth MacKenzie
GECCO
2005
Springer
130views Optimization» more  GECCO 2005»
14 years 3 months ago
ATNoSFERES revisited
ATNoSFERES is a Pittsburgh style Learning Classifier System (LCS) in which the rules are represented as edges of an Augmented Transition Network. Genotypes are strings of tokens ...
Samuel Landau, Olivier Sigaud, Marc Schoenauer
DISCEX
2003
IEEE
14 years 3 months ago
Interactions Between TCP and the IEEE 802.11 MAC Protocol
The IEEE 802.11x MAC protocol, the de facto standard for wireless LANs, includes a distributed coordination function (DCF) mode usable for ad hoc network architectures. The Transm...
Rui Jiang, Vikram Gupta, Chinya V. Ravishankar
ICDM
2003
IEEE
119views Data Mining» more  ICDM 2003»
14 years 3 months ago
A Dynamic Adaptive Self-Organising Hybrid Model for Text Clustering
Clustering by document concepts is a powerful way of retrieving information from a large number of documents. This task in general does not make any assumption on the data distrib...
Chihli Hung, Stefan Wermter