Sciweavers

2135 search results - page 54 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
BROADNETS
2005
IEEE
14 years 1 months ago
Performance analysis and enhancement for backbone based wireless mobile ad hoc networks
—In this paper, we present an extended Mobile Backbone Network (MBN) topology synthesis algorithm (ETSA) for constructing and maintaining a dynamic backbone structure in mobile w...
Laura Huei-jiun Ju, Izhak Rubin
EOR
2008
83views more  EOR 2008»
13 years 8 months ago
Rerouting tunnels for MPLS network resource optimization
In Multi-Protocol Label Switching (MPLS) networks, traffic demands can be routed along tunnels called Label Switched Paths (LSPs). A tunnel is characterized by a path in the netwo...
Olivier Klopfenstein
NDSS
2008
IEEE
14 years 2 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
JSAC
2007
180views more  JSAC 2007»
13 years 8 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
ICONIP
2008
13 years 9 months ago
Time Series Analysis for Long Term Prediction of Human Movement Trajectories
This paper's intention is to adapt prediction algorithms well known in the field of time series analysis to problems being faced in the field of mobile robotics and Human-Robo...
Sven Hellbach, Julian Eggert, Edgar Körner, H...