Sciweavers

2663 search results - page 472 / 533
» How to Choose a Timing Model
Sort
View
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 9 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
DSS
2008
114views more  DSS 2008»
13 years 9 months ago
Price formation and its dynamics in online auctions
This research uses functional data modelling to study the price formation process of online auctions. It conceptualizes the price curve and its first and second derivatives (veloc...
Ravi Bapna, Wolfgang Jank, Galit Shmueli
ENTCS
2008
110views more  ENTCS 2008»
13 years 9 months ago
Performance Evaluation of Elastic GALS Interfaces and Network Fabric
This paper reports on the design of a test chip built to test a) a new latency insensitive network fabric protocol and circuits, b) a new synchronizer design, and c) how efficient...
JunBok You, Yang Xu, Hosuk Han, Kenneth S. Stevens
CN
2007
88views more  CN 2007»
13 years 8 months ago
DMTP: Controlling spam through message delivery differentiation
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
JNW
2008
79views more  JNW 2008»
13 years 8 months ago
A Call Admission Control Protocol for Multimedia Cellular Networks
The performance of any cellular wireless network, as well as its revenue (number of customers using the network, and their degree of satisfaction) is determined to a great extent b...
Ayman Elnaggar, Mokhtar Aboelaze, Maan Musleh