Sciweavers

448 search results - page 80 / 90
» A funneling-MAC for high performance data collection in sens...
Sort
View
IEEEIAS
2008
IEEE
14 years 1 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
BMCBI
2010
202views more  BMCBI 2010»
13 years 7 months ago
NeMo: Network Module identification in Cytoscape
Background: As the size of the known human interactome grows, biologists increasingly rely on computational tools to identify patterns that represent protein complexes and pathway...
Corban G. Rivera, Rachit Vakil, Joel S. Bader
LCN
2005
IEEE
14 years 29 days ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
SIGMOD
2008
ACM
188views Database» more  SIGMOD 2008»
14 years 7 months ago
Just-in-time query retrieval over partially indexed data on structured P2P overlays
Structured peer-to-peer (P2P) overlays have been successfully employed in many applications to locate content. However, they have been less effective in handling massive amounts o...
Sai Wu, Jianzhong Li, Beng Chin Ooi, Kian-Lee Tan
IMC
2005
ACM
14 years 29 days ago
Understanding Congestion in IEEE 802.11b Wireless Networks
The growing popularity of wireless networks has led to cases of heavy utilization and congestion. In heavily utilized wireless networks, the wireless portion of the network is a m...
Amit P. Jardosh, Krishna N. Ramachandran, Kevin C....