Sciweavers

12373 search results - page 2355 / 2475
» Semi-Logarithmic Number Systems
Sort
View
JNSM
2008
93views more  JNSM 2008»
13 years 9 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
JCP
2006
110views more  JCP 2006»
13 years 9 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
JCP
2006
93views more  JCP 2006»
13 years 9 months ago
Reliable Partial Replication of Contents in Web Clusters: Getting Storage without losing Reliability
Traditionally, distributed Web servers have used two strategies for allocating files on server nodes: full replication and full distribution. While full replication provides a high...
José Daniel García, Jesús Car...
DM
2007
83views more  DM 2007»
13 years 9 months ago
Codes identifying sets of vertices in random networks
In this paper we deal with codes identifying sets of vertices in random networks; that is, (1, ≤ ℓ)-identifying codes. These codes enable us to detect sets of faulty processor...
Alan M. Frieze, Ryan Martin, Julien Moncel, Mikl&o...
JUCS
2008
137views more  JUCS 2008»
13 years 9 months ago
CrossMDA: a Model-driven Approach for Aspect Management
: Nowadays, the complexity of software applications has brought new challenges to developers, having to deal with a large number of computational requirements. Among these requirem...
Marcelo Pitanga Alves, Paulo F. Pires, Fláv...
« Prev « First page 2355 / 2475 Last » Next »