Sciweavers

2385 search results - page 403 / 477
» Sense of Direction in Distributed Computing
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
LCN
2006
IEEE
14 years 1 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz
PERCOM
2006
ACM
14 years 1 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller
ROBIO
2006
IEEE
139views Robotics» more  ROBIO 2006»
14 years 1 months ago
Biologically Inspired Reflex Based Stabilization Control of a Humanoid Robot with Artificial SMA Muscles
- Suddenly occurring collisions or unintentional motions represent a high safety risk in robotics and must be prevented. Especially for humanoid robots, the influence of disturbanc...
Robert Kratz, Sebastian Klug, Maximilian Stelzer, ...
TAICPART
2006
IEEE
131views Education» more  TAICPART 2006»
14 years 1 months ago
Bogor: A Flexible Framework for Creating Software Model Checkers
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. With the proliferation of multicore arch...
Robby, Matthew B. Dwyer, John Hatcliff