Sciweavers

1709 search results - page 188 / 342
» networks 2000
Sort
View
MOBICOM
2000
ACM
14 years 2 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
CL
2000
Springer
14 years 2 months ago
Logic, Knowledge Representation, and Bayesian Decision Theory
In this paper I give a brief overview of recent work on uncertainty inAI, and relate it to logical representations. Bayesian decision theory and logic are both normative frameworks...
David Poole
JNCA
2000
117views more  JNCA 2000»
13 years 10 months ago
Distributed network storage service with quality-of-service guarantees
This paper envisions a distributed network storage service with Quality-ofService (QoS) guarantees, and describes its architecture and key mechanisms. When fully realized, this se...
John Chung-I Chuang, Marvin A. Sirbu
NDSS
2000
IEEE
14 years 2 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
NDSS
2000
IEEE
14 years 2 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...