Sciweavers

1636 search results - page 121 / 328
» Using Bayesian Networks to Model Agent Relationships
Sort
View
ACSAC
2003
IEEE
14 years 21 days ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
SMARTNET
2000
13 years 10 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou
JNSM
2000
122views more  JNSM 2000»
13 years 8 months ago
Communications Systems Driven by Software Agent Technology
The application of software agent technology to the management of communications' infrastructures is a challenging domain as it requires management on different time scales a...
Alex L. Hayzelden, John Bigham, Stefan Poslad, Phi...
ISN
1998
Springer
14 years 1 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
INFOCOM
2006
IEEE
14 years 3 months ago
Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective
— Since the original work of Grossglauser and Tse, which showed that the mobility can increase the capacity of an ad hoc network, there has been a lot of interest in characterizi...
Gaurav Sharma, Ravi Mazumdar, Ness B. Shroff