Sciweavers

1855 search results - page 352 / 371
» System Consequence
Sort
View
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
ICCS
2003
Springer
14 years 3 months ago
Self-Organizing Hybrid Neurofuzzy Networks
Abstract. We introduce a concept of self-organizing Hybrid Neurofuzzy Networks (HNFN), a hybrid modeling architecture combining neurofuzzy (NF) and polynomial neural networks(PNN)....
Sung-Kwun Oh, Su-Chong Joo, Chang-Won Jeong, Hyun-...
EWSN
2010
Springer
14 years 3 months ago
Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks
One unfortunate consequence of the success story of wireless sensor networks (WSNs) in separate research communities is an evergrowing gap between theory and practice. Even though ...
Tobias Baumgartner, Ioannis Chatzigiannakis, S&aac...
INFOCOM
2002
IEEE
14 years 2 months ago
Optimal Configuration of OSPF Aggregates
—Open Shortest Path First (OSPF) is a popular protocol for routing within an autonomous system (AS) domain. In order to scale for large networks containing hundreds and thousands...
Rajeev Rastogi, Yuri Breitbart, Minos N. Garofalak...
SAINT
2002
IEEE
14 years 2 months ago
Service Emergence based on Relationship among Self-Organizing Entities
In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net...
Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tats...