Sciweavers

7988 search results - page 1428 / 1598
» A Useful Undecidable Theory
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
144
Voted
IROS
2008
IEEE
104views Robotics» more  IROS 2008»
15 years 10 months ago
Generalizing metamodules to simplify planning in modular robotic systems
— In this paper we develop a theory of metamodules and an associated distributed asynchronous planner which generalizes previous work on metamodules for lattice-based modular rob...
Daniel J. Dewey, Michael P. Ashley-Rollman, Michae...
ITNG
2008
IEEE
15 years 10 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
VTC
2008
IEEE
141views Communications» more  VTC 2008»
15 years 10 months ago
Mobile WiMAX: Performance Analysis and Comparison with Experimental Results
— The demand for broadband mobile services continues to grow. Conventional high-speed broadband solutions are based on wired-access technologies such as digital subscriber line (...
Mai Tran, George Zaggoulos, Andrew R. Nix, Angela ...
137
Voted
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 10 months ago
Applying Techniques from Frame Synchronization for Biological Sequence Analysis
— During the last years, the amount of genetic data available has increased rapidly which creates the demand for advanced techniques for their interpretation. In the following, w...
Johanna Weindl, Joachim Hagenauer
« Prev « First page 1428 / 1598 Last » Next »