Sciweavers

849 search results - page 133 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
DSOM
2003
Springer
14 years 2 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
JSAC
2008
95views more  JSAC 2008»
13 years 8 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
PASTE
2010
ACM
14 years 1 months ago
Opportunities for concurrent dynamic analysis with explicit inter-core communication
Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which incl...
Jungwoo Ha, Stephen P. Crago
GECCO
2005
Springer
14 years 2 months ago
Using an interactive evolutionary algorithm to help fitting a cochlear implant
Cochlear implants are electronic devices that stimulate directly the auditory nerve to allow totally deaf patients to hear again. This paper presents an interactive evolutionary a...
Claire Bourgeois-République, Bruno Frachet,...
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
14 years 3 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...