Sciweavers

371 search results - page 58 / 75
» Secure Dynamic Source Routing
Sort
View
CSREASAM
2006
13 years 10 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ICRA
1994
IEEE
154views Robotics» more  ICRA 1994»
14 years 25 days ago
The Network Data Delivery Service: Real-Time Data Connectivity for Distributed Control Applications
The Network Data Delivery Service NDDS is a novel network data-sharing system. NDDS builds on the model of information producers sources and consumers sinks. Producers generate da...
Gerardo Pardo-Castellote, Stanley A. Schneider
COMCOM
2008
100views more  COMCOM 2008»
13 years 8 months ago
Multicast algorithms in service overlay networks
Overlay routing has been proposed to enhance the reliability and performance of IP networks, since it can bypass congestion and transient outages by forwarding traffic through one ...
Dario Pompili, Caterina M. Scoglio, Luca Lopez
MASS
2010
186views Communications» more  MASS 2010»
13 years 6 months ago
VAN: Vehicle-assisted shortest-time path navigation
Traffic congestion is a very serious problem in large cities. With the number of vehicles increasing rapidly, especially in cities whose economy is booming, the situation is gettin...
Wenping Chen, Sencun Zhu, Deying Li
ADHOC
2004
134views more  ADHOC 2004»
13 years 8 months ago
Scalable team multicast in wireless ad hoc networks exploiting coordinated motion
In this paper, we study a new multicast paradigm for large scale mobile ad hoc networks, namely team multicast. In team multicast the multicast group does not consist of individua...
Yunjung Yi, Mario Gerla, Katia Obraczka