Sciweavers

4052 search results - page 50 / 811
» Using RDF to describe networks
Sort
View
ICT
2004
Springer
131views Communications» more  ICT 2004»
14 years 3 months ago
Fairness and Protection Behavior of Resilient Packet Ring Nodes Using Network Processors
The Resilient Packet Ring IEEE 802.17 is an evolving standard for the construction of Local and Metropolitan Area Networks. The RPR protocol scales to the demands of future packet ...
Andreas Kirstädter, Axel Hof, Walter Meyer, E...
APIN
2007
118views more  APIN 2007»
13 years 10 months ago
Using genetic algorithms to reorganize superpeer structure in peer to peer networks
In this thesis, we describe a genetic algorithm for optimizing the superpeer structure of semantic peer to peer networks. Peer to peer, also called P2P, networks enable us to sear...
Jaymin Kessler, Khaled Rasheed, Ismailcem Budak Ar...
AAAI
2007
14 years 7 days ago
Interest-Matching Comparisons using CP-nets
The formation of internet-based social networks has revived research on traditional social network models as well as interest-matching, or match-making, systems. In order to autom...
Andrew W. Wicker, Jon Doyle
CCR
2004
94views more  CCR 2004»
13 years 9 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
CCS
2007
ACM
14 years 4 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia