Sciweavers

1610 search results - page 294 / 322
» Identity Based Multisignatures
Sort
View

Publication
167views
13 years 8 months ago
A Network Coding Approach to IP Traceback
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
Pegah Sattari, Minas Gjoka, Athina Markopoulou
BMCBI
2006
111views more  BMCBI 2006»
13 years 8 months ago
Tools for integrated sequence-structure analysis with UCSF Chimera
Background: Comparing related structures and viewing the structures in the context of sequence alignments are important tasks in protein structure-function research. While many pr...
Elaine C. Meng, Eric F. Pettersen, Gregory S. Couc...
IJSN
2006
65views more  IJSN 2006»
13 years 8 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
CORR
2007
Springer
91views Education» more  CORR 2007»
13 years 8 months ago
Unequal dimensional small balls and quantization on Grassmann Manifolds
—The Grassmann manifold Gn,p (L) is the set of all p-dimensional planes (through the origin) in the n-dimensional Euclidean space Ln , where L is either R or C. This paper consid...
Wei Dai, Brian Rider, Youjian Liu
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...