Sciweavers

623 search results - page 45 / 125
» Declarative Network Verification
Sort
View
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 10 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
WISE
2000
Springer
14 years 1 months ago
A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks
A closed form of autocorrelation functions about asymptotically self-similar processes is presented. The verification shows that this form best the realtrajfic data on Ethernet in...
Ming Li, Weijia Jia, Wei Zhao
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
14 years 9 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
NETWORKING
2000
13 years 10 months ago
Survivability Analysis of Ad Hoc Wireless Network Architecture
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...
SIGMOD
2005
ACM
156views Database» more  SIGMOD 2005»
14 years 9 months ago
Model-driven design of service-enabled web applications
Significant efforts are currently invested in application integration to enable the interaction and composition of business processes of different companies, yielding complex, mul...
Marco Brambilla, Stefano Ceri, Piero Fraternali, R...