Sciweavers

905 search results - page 49 / 181
» The Case Against Micropayments
Sort
View
CNSR
2005
IEEE
14 years 1 months ago
Third-Party Flow Control
Flow control is critical to the efficient operation of Internet Service Providers network equipment. In particular, the ability to effectively shape traffic can reduce cost and ...
Dushyant Bansal, Paul A. S. Ward
HICSS
2005
IEEE
96views Biometrics» more  HICSS 2005»
14 years 1 months ago
Network Centric Warfare in the U.S. Navy's Fifth Fleet
This case study was commissioned by the Office of Force Transformation in the United States Department of Defense to examine the employment of Network Centric Warfare (NCW) system...
John Kruse, Mark Adkins, Kimberly A. Holloman
ISSADS
2005
Springer
14 years 1 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ACSAC
2002
IEEE
14 years 27 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
13 years 11 months ago
A comparison of evaluation methods in coevolution
In this research, we compare four different evaluation methods in coevolution on the Majority Function problem. The size of the problem is selected such that an evaluation against...
Ting-Shuo Yo, Edwin D. de Jong