Sciweavers

472 search results - page 91 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
MOBISYS
2010
ACM
13 years 10 months ago
Energy-efficient rate-adaptive GPS-based positioning for smartphones
Many emerging smartphone applications require position information to provide location-based or context-aware services. In these applications, GPS is often preferred over its alte...
Jeongyeup Paek, Joongheon Kim, Ramesh Govindan
SIGCOMM
2009
ACM
14 years 2 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ISSA
2004
13 years 9 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
NIPS
2004
13 years 9 months ago
Bayesian inference in spiking neurons
We propose a new interpretation of spiking neurons as Bayesian integrators accumulating evidence over time about events in the external world or the body, and communicating to oth...
Sophie Deneve
ICDCS
2011
IEEE
12 years 7 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...