Sciweavers

1421 search results - page 216 / 285
» Algorithms for subsequence combinatorics
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
CNSR
2005
IEEE
15 years 9 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Estimating Packet Arrival Times in Bursty Video Applications
In retransmission-based error-control methods, the most fundamental yet the paramount problem is to determine how long the sender (or the receiver) should wait before deciding tha...
Ali C. Begen, Yucel Altunbasak
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
15 years 9 months ago
Comparison of Alternate Methods for Distributed Motion Planning of Robot Collectives within a Potential Field Framework
– In this paper, we evaluate the performance of two candidate formulations for distributed motion planning of robot collectives within an Artificial Potential Field (APF) framewo...
Leng-Feng Lee, Rajankumar Bhatt, Venkat Krovi
VLSID
2005
IEEE
120views VLSI» more  VLSID 2005»
15 years 9 months ago
On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design
During pseudorandom testing, a significant amount of energy and test application time is wasted for generating and for applying “useless” test vectors that do not contribute t...
Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattachar...