Sciweavers

234 search results - page 39 / 47
» An Analysis of Multiple Tutoring Protocols
Sort
View
CNIS
2006
13 years 9 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
JCM
2008
81views more  JCM 2008»
13 years 7 months ago
Power Allocation for Amplify-and-Forward Cooperative Transmission Over Rayleigh-Fading Channels
Cooperative transmission has been used to achieve diversity gain through partner to create multiple independent fading channels. It has attracted lots of research attention in rece...
Lian Zhao, Zaiyi Liao
JCSS
2006
56views more  JCSS 2006»
13 years 7 months ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
TWC
2008
156views more  TWC 2008»
13 years 7 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
CCS
2005
ACM
14 years 1 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...