Sciweavers

91 search results - page 12 / 19
» Sources and Monitors: A Trust Model for Peer-to-Peer Network...
Sort
View
CIA
2007
Springer
14 years 2 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CSFW
1999
IEEE
14 years 27 days ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
IJCAI
1997
13 years 10 months ago
On the Role of Hierarchy for Neural Network Interpretation
In this paper, we concentrate on the expressive power of hierarchical structures in neural networks. Recently, the so-called SplitNet model was introduced. It develops a dynamic n...
Jürgen Rahmel, Christian Blum, Peter Hahn
ESANN
2008
13 years 10 months ago
Simulation of a recurrent neurointerface with sparse electrical connections
With the technical development of multi-electrode arrays, the monitoring of many individual neurons has become feasible. However, for practical use of those arrays as bidirectional...
Andreas Herzog, Karsten Kube, Bernd Michaelis, Ana...
IMC
2007
ACM
13 years 10 months ago
Interference map for 802.11 networks
The interference map of an 802.11 network is a collection of data structures that can help heuristics for routing, channel assignment and call admission in dense wireless networks...
Dragos Niculescu