Sciweavers

688 search results - page 119 / 138
» Extracting the abstraction pyramid from complex networks
Sort
View
RTAS
2007
IEEE
14 years 1 months ago
Full Duplex Switched Ethernet for Next Generation "1553B"-Based Applications
Over the last thirty years, the MIL-STD 1553B data bus has been used in many embedded systems, like aircrafts, ships, missiles and satellites. However, the increasing number and c...
Ahlem Mifdaoui, Fabrice Frances, Christian Fraboul
IMC
2003
ACM
14 years 11 hour ago
Constructing internet coordinate system based on delay measurement
In this paper, we consider the problem of how to represent the locations of Internet hosts in a Cartesian coordinate system to facilitate estimate of the network distance between ...
Hyuk Lim, Jennifer C. Hou, Chong-Ho Choi
TELETRAFFIC
2007
Springer
14 years 26 days ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
COMPUTER
2010
127views more  COMPUTER 2010»
13 years 4 months ago
Data Stream Management Systems for Computational Finance
Computational finance leverages computer technologies to build models from large amounts of data to extract insight. In today's networked world, the amount of data available t...
Badrish Chandramouli, Mohamed H. Ali, Jonathan Gol...
JIPS
2010
195views more  JIPS 2010»
13 years 1 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa