Sciweavers

13987 search results - page 2637 / 2798
» The Two Guards Problem
Sort
View
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 1 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 1 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
14 years 1 months ago
An Evaluation of Applying Use Cases to Construct Design versus Validate Design
Use case models capture and describe the functional requirements of a software system. A use case driven development process, where a use case model is the principal basis for con...
Erik Syversen, Bente Anda, Dag I. K. Sjøber...
INFOCOM
2003
IEEE
14 years 1 months ago
A Framework for Incremental Deployment Strategies for Router-Assisted Services
— Incremental deployment of a new network service or protocol is typically a hard problem, especially when it has to be deployed in the routers. First, an incrementally deployabl...
Xinming He, Christos Papadopoulos, Pavlin Radoslav...
INFOCOM
2003
IEEE
14 years 1 months ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...
« Prev « First page 2637 / 2798 Last » Next »