Sciweavers

2162 search results - page 383 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
SIGCOMM
2000
ACM
14 years 2 months ago
When the CRC and TCP checksum disagree
Traces of Internet packets from the past two years show that between 1 packet in 1,100 and 1 packet in 32,000 fails the TCP checksum, even on links where link-level CRCs should ca...
Jonathan Stone, Craig Partridge

Lecture Notes
404views
15 years 8 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
ECCV
2006
Springer
14 years 12 months ago
Scene Classification Via pLSA
Given a set of images of scenes containing multiple object categories (e.g. grass, roads, buildings) our objective is to discover these objects in each image in an unsupervised man...
Anna Bosch, Andrew Zisserman, Xavier Muñoz
ICDE
2005
IEEE
143views Database» more  ICDE 2005»
14 years 11 months ago
Postgres-R(SI): Combining Replica Control with Concurrency Control based on Snapshot Isolation
Replicating data over a cluster of workstations is a powerful tool to increase performance, and provide faulttolerance for demanding database applications. The big challenge in su...
Shuqing Wu, Bettina Kemme
ICSE
2008
IEEE-ACM
14 years 10 months ago
Time-bounded adaptation for automotive system software
Software is increasingly deployed in vehicles as demand for new functionality increases and cheaper and more powerful hardware becomes available. Likewise, emerging wireless commu...
Aline Senart, Douglas C. Schmidt, Serena Fritsch, ...