Sciweavers

673 search results - page 117 / 135
» Request behavior variations
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
A dynamic game solution to malware attack
—Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can d...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
CORR
2011
Springer
207views Education» more  CORR 2011»
12 years 11 months ago
Ergodic Transmission Capacity of Wireless Ad Hoc Networks with Interference Management
Most work on wireless network throughput ignores the temporal correlation inherent to wireless channels because it degrades tractability. To better model and quantify the temporal...
Chun-Hung Liu, Jeffrey G. Andrews
SENSYS
2009
ACM
14 years 2 months ago
Integrated distributed energy awareness for wireless sensor networks
Energy in sensor networks is a distributed, non-transferable resource. Over time, differences in energy availability are likely to arise. Protocols like routing trees may concent...
Geoffrey Werner Challen, Jason Waterman, Matt Wels...
ASMTA
2009
Springer
104views Mathematics» more  ASMTA 2009»
14 years 2 months ago
Preliminary Results on a Simple Approach to G/G/c-Like Queues
In this paper we consider a multi-server queue with a near general arrival process (represented as an arbitrary state-dependent Coxian distribution), a near general state-dependent...
Alexandre Brandwajn, Thomas Begin
ACSAC
2007
IEEE
14 years 1 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....