Sciweavers

1039 search results - page 58 / 208
» networks 1998
Sort
View
ACSAC
1998
IEEE
14 years 1 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
PRL
1998
132views more  PRL 1998»
13 years 9 months ago
Unsupervised feature selection using a neuro-fuzzy approach
A neuro-fuzzy methodology is described which involves connectionist minimization of a fuzzy feature evaluation index with unsupervised training. The concept of a ¯exible membersh...
Jayanta Basak, Rajat K. De, Sankar K. Pal
ICMAS
1998
13 years 10 months ago
Implementation Issues on Market-Based QoS Control
In this paper, we discuss two major tradeoffs, spatial and temporal tradeoffs, that appear when applying marketbased computing to multimedia network applications. The former appea...
Hirofumi Yamaki, Yutaka Yamauchi, Toru Ishida
HPN
1992
13 years 10 months ago
A Host Interface Architecture for High-Speed Networks
This paper describes a new host interface architecture for high-speed networks operating at 800 of Mbit/second or higher rates. The architecture is targeted to achieve several 100...
Peter Steenkiste, Brian Zill, H. T. Kung, Steven S...
INFOCOM
1998
IEEE
14 years 1 months ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...