Sciweavers

1875 search results - page 276 / 375
» Automatic Network Protocol Analysis
Sort
View
GECCO
2007
Springer
188views Optimization» more  GECCO 2007»
14 years 3 months ago
Using genetic algorithms for naval subsystem damage assessment and design improvements
Some auxiliary systems of next generation naval ships will utilize distributed automatic control. Such distributed control systems will use interconnected sensors, actuators, cont...
Christopher McCubbin, David Scheidt, Oliver Bandte...
MM
2006
ACM
93views Multimedia» more  MM 2006»
14 years 3 months ago
A scalable service for photo annotation, sharing, and search
In this work we present the details of the implementation of Fotofiti(FF), a website that provides automatic semantic annotation of digital photographs, event management and soci...
Benjamin N. Lee, WenYen Chen, Edward Y. Chang
WWW
2004
ACM
14 years 9 months ago
Accurate, scalable in-network identification of p2p traffic using application signatures
The ability to accurately identify the network traffic associated with different P2P applications is important to a broad range of network operations including application-specifi...
Subhabrata Sen, Oliver Spatscheck, Dongmei Wang
TRIDENTCOM
2005
IEEE
14 years 2 months ago
TBI: End-to-End Network Performance Measurement Testbed for Empirical Bottleneck Detection
— Recent advances in networking include new bandwidth-intensive applications, sophisticated protocols that enable real-time data and multimedia delivery and aspects of network se...
Prasad Calyam, Dima Krymskiy, Mukundan Sridharan, ...
CAV
2000
Springer
197views Hardware» more  CAV 2000»
14 years 1 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin