Sciweavers

12536 search results - page 204 / 2508
» Cardinality Networks and Their Applications
Sort
View
AUSFORENSICS
2003
15 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
SENSYS
2003
ACM
15 years 10 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
IAJIT
2010
117views more  IAJIT 2010»
15 years 3 months ago
Development of Neural Networks for Noise Reduction
: This paper describes the development of neural network models for noise reduction. The networks used to enhance the performance of modeling captured signals by reducing the effec...
Lubna Badri
142
Voted
TELETRAFFIC
2007
Springer
15 years 10 months ago
On the Interaction Between Internet Applications and TCP
Abstract. We focus in this paper on passive traffic measurement techniques that collect traces of TCP packets and analyze them to derive, for example, round-trip times or aggregate...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
130
Voted
DAC
2001
ACM
16 years 5 months ago
Automatic Generation of Application-Specific Architectures for Heterogeneous Multiprocessor System-on-Chip
We present a design flow for the generation of application-specific multiprocessor architectures. In the flow, architectural parameters are first extracted from a high-level syste...
Damien Lyonnard, Sungjoo Yoo, Amer Baghdadi, Ahmed...