Sciweavers

2135 search results - page 38 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
NETWORKING
2004
13 years 9 months ago
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
If efficient network analysis tools were available, it could become possible to detect the attacks, anomalies and to appropriately take action to contain the attacks. In this paper...
Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannu...
BMCBI
2008
97views more  BMCBI 2008»
13 years 8 months ago
MCM-test: a fuzzy-set-theory-based approach to differential analysis of gene pathways
Background: Gene pathway can be defined as a group of genes that interact with each other to perform some biological processes. Along with the efforts to identify the individual g...
Lily R. Liang, Vinay Mandal, Yi Lu, Deepak Kumar
NOMS
2008
IEEE
14 years 2 months ago
A novel approach to bottleneck analysis in networks
—In this paper∗ , we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in...
Nikhil Shetty, Assane Gueye, Jean C. Walrand
PVLDB
2008
123views more  PVLDB 2008»
13 years 7 months ago
Dependable cardinality forecasts for XQuery
Though inevitable for effective cost-based query rewriting, the derivation of meaningful cardinality estimates has remained a notoriously hard problem in the context of XQuery. By...
Jens Teubner, Torsten Grust, Sebastian Maneth, She...
ACSAC
2005
IEEE
14 years 1 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...