Sciweavers

1314 search results - page 113 / 263
» The Impact of Active Networks on Established Network Operato...
Sort
View
IJSN
2008
80views more  IJSN 2008»
13 years 9 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
SIGCOMM
2006
ACM
14 years 3 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
ECIS
2003
13 years 10 months ago
The role of informal networks in knowledge sharing
The application of a knowledge management strategy does not take place in a vacuum. Successfully meeting objectives of a knowledge management strategy may depend not only on the e...
Tony Jewels, Alan Underwood, Carmen de Pablos Here...
EVOW
2003
Springer
14 years 2 months ago
Comparison of AdaBoost and Genetic Programming for Combining Neural Networks for Drug Discovery
Genetic programming (GP) based data fusion and AdaBoost can both improve in vitro prediction of Cytochrome P450 activity by combining artificial neural networks (ANN). Pharmaceuti...
William B. Langdon, S. J. Barrett, Bernard F. Buxt...
INFOCOM
2012
IEEE
11 years 11 months ago
Network optimization for DHT-based applications
—P2P platforms have been criticized because of the heavy strain that some P2P services can inflict on costly interdomain links of network operators. It is therefore necessary to...
Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Gu...