Sciweavers

436 search results - page 59 / 88
» A novel approach to bottleneck analysis in networks
Sort
View
GLOBECOM
2009
IEEE
14 years 27 days ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
ECCV
2000
Springer
14 years 11 months ago
Non-linear Bayesian Image Modelling
In recent years several techniques have been proposed for modelling the low-dimensional manifolds, or `subspaces', of natural images. Examples include principal component anal...
Christopher M. Bishop, John M. Winn
RAID
2005
Springer
14 years 2 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
IMC
2005
ACM
14 years 2 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
TMC
2008
129views more  TMC 2008»
13 years 9 months ago
Mobility Modeling and Performance Evaluation of Heterogeneous Wireless Networks
The future-generation wireless systems will combine heterogeneous wireless access technologies to provide mobile users with seamless access to a diverse set of applications and ser...
Ahmed H. Zahran, Ben Liang, Aladdin Saleh