Sciweavers

1118 search results - page 196 / 224
» Hybrid possibilistic networks
Sort
View
WINET
2002
138views more  WINET 2002»
13 years 8 months ago
An Architecture for Secure Wide-Area Service Discovery
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
MTA
2007
110views more  MTA 2007»
13 years 8 months ago
On aggregate available bandwidth in many-to-one data transfer - modeling and applications
Abstract This work investigates the modeling of aggregate available bandwidth in multisender network applications. Unlike the well-established client–server model, where there is...
S. C. Hui, Jack Y. B. Lee
CORR
2008
Springer
140views Education» more  CORR 2008»
13 years 7 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
PVLDB
2010
166views more  PVLDB 2010»
13 years 7 months ago
Complex Event Detection at Wire Speed with FPGAs
Complex event detection is an advanced form of data stream processing where the stream(s) are scrutinized to identify given event patterns. The challenge for many complex event pr...
Louis Woods, Jens Teubner, Gustavo Alonso
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
13 years 6 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...