Sciweavers

1875 search results - page 274 / 375
» Automatic Network Protocol Analysis
Sort
View
RAID
2005
Springer
14 years 2 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
INTEGRATION
2008
183views more  INTEGRATION 2008»
13 years 9 months ago
Network-on-Chip design and synthesis outlook
With the growing complexity in consumer embedded products, new tendencies forecast heterogeneous Multi-Processor SystemsOn-Chip (MPSoCs) consisting of complex integrated component...
David Atienza, Federico Angiolini, Srinivasan Mura...
AINTEC
2007
Springer
14 years 3 months ago
WOD - Proxy-Based Web Object Delivery Service
With the tremendous growth of World Wide Web (WWW), the door has been opened to a multitude of services and information for even the most casual of users. Today, many wireless and ...
Kai-Hsiang Yang, Jan-Ming Ho
PERCOM
2008
ACM
14 years 8 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
MONET
2007
98views more  MONET 2007»
13 years 8 months ago
A Markov Model for Indoor Ultra-wideband Channel with People Shadowing
Abstract For an indoor ultra-wideband (UWB) communication system, the line-of-sight (LOS) between the transmitter and receiver may be frequently blocked by moving people. Blocking ...
Ruonan Zhang, Lin Cai