Sciweavers

617 search results - page 78 / 124
» Research Challenges for the Security of Control Systems
Sort
View
INFOSCALE
2006
ACM
14 years 3 months ago
Information retrieval in a peer-to-peer environment
Due to rapid information growth, peer-to-peer (P2P) systems have become a promising alternative to centralized, client/server-based approaches for large-scale data sharing. By all...
Dik Lun Lee, Dyce Jing Zhao, Qiong Luo
AGENTS
2001
Springer
14 years 1 months ago
Automatically tracking and analyzing the behavior of live insect colonies
We introduce the study of live social insect colonies as a relevant and exciting domain for the development and application of multi-agent systems modeling tools. Social insects p...
Tucker R. Balch, Zia Khan, Manuela M. Veloso
ISSA
2004
13 years 10 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
MOBISYS
2008
ACM
14 years 8 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...
ATAL
2009
Springer
14 years 3 months ago
From DPS to MAS to ...: continuing the trends
The most important and interesting of the computing challenges we are facing are those that involve the problems and opportunities afforded by massive decentralization and disinte...
Michael N. Huhns