Sciweavers

194 search results - page 34 / 39
» Wireless Intrusion Detection and Response
Sort
View
CN
2002
120views more  CN 2002»
13 years 9 months ago
TCP-Real: receiver-oriented congestion control
We introduce a receiver-oriented approach to congestion control, demonstrated by an experimental protocol, TCP-Real. The protocol allows for a measurement-based transmission strate...
Vassilios Tsaoussidis, Chi Zhang
PERCOM
2003
ACM
14 years 9 months ago
Self-Adaptive Leasing for Jini
Distributed systems require strategies to detect and recover from failures. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder acc...
Kevin Bowers, Kevin Mills, Scott Rose
AAMAS
2006
Springer
13 years 10 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
ICC
2008
IEEE
168views Communications» more  ICC 2008»
14 years 4 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
SENSYS
2003
ACM
14 years 3 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...