An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The Scalable Reservation Protocol (SRP) provides a light-weight reservation mechanism for adaptive multimedia applications. Our main focus is on good scalability to very large numbers of individual flows. End systems (i.e. senders and destinations) activel ...
Current resource reservation architectures for multimedia networks do not scale well for a large number of flows. We propose a new architecture that automatically aggregates flows on each link in the network. Therefore, the network has no knowledge of indi ...
Terminode routing, defined for potentially very large mobile ad hoc networks, forwards packets along anchored paths. An anchored path is a list of fixed geographic points, called anchors. Given that geographic points do not move, the advantage to tradition ...
In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavi ...
CD4(+) T cells are considered to be the major controlling element of the adaptive immune response. They recognize foreign peptides by interaction of the T cell receptor (TCR) with peptide complexed to major histocompatibility complex (MHC) class II molecul ...
In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavi ...
Immune evasion mechanisms of human CMV are known; however, the immune control of infection remains poorly elucidated. We show that interaction between the viral protein UL18 on infected cells and the invariant receptor CD85j/LIR-1/ILT2 expressed on CTL is ...
The B7 co-stimulatory pathway is critical to T cell activation, however its role in the generation of Th2 cells in vivo remains controversial. We have studied the role of B7 co-stimulation in the development of a Th2 immune response to the nematode parasit ...
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. In the ...