Sciweavers

1039 search results - page 99 / 208
» networks 1998
Sort
View
IEEEARES
2006
IEEE
14 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
CLUSTER
1998
IEEE
13 years 8 months ago
Forwarding Group Multicast Protocol (FGMP) for multihop, mobile wireless networks
In this paper we propose a new multicast protocol for multihop mobile wireless networks. Instead of forming multicast trees, a group of nodes in charge of forwarding multicast pac...
Ching-Chuan Chiang, Mario Gerla, Lixia Zhang
CODES
1998
IEEE
14 years 1 months ago
Hardware/software co-design of an ATM network interface card: a case study
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed ...
Jean-Marc Daveau, Gilberto Fernandes Marchioro, Ah...
ICRE
1998
IEEE
14 years 1 months ago
Requirements Definition for Survivable Network Systems
Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused...
Richard C. Linger, Nancy R. Mead, Howard F. Lipson
VRST
1999
ACM
14 years 1 months ago
Patterns of network and user activity in an inhabited television event
Inhabited Television takes traditional broadcast television and combines it with multiuser virtual reality, to give new possibilities for interaction and participation in and arou...
Chris Greenhalgh, Steve Benford, Michael P. Craven