Sciweavers

2008 search results - page 357 / 402
» MUC-4 evaluation metrics
Sort
View
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 8 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
CN
2007
80views more  CN 2007»
13 years 8 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
JCM
2006
72views more  JCM 2006»
13 years 8 months ago
QoS Routing with Bandwidth and Hop-Count Consideration: A Performance Perspective
QoS Routing has been studied to provide evidence that it can increase network utilization compared to routing that is insensitive to QoS traffic requirements. However, because of i...
Bo Peng, Andrew H. Kemp, Said Boussakta
JWSR
2008
109views more  JWSR 2008»
13 years 8 months ago
DsCWeaver: Synchronization-Constraint Aspect Extension to Procedural Process Specification Languages
BPEL is emerging as an open-standards language for Web service composition. However, its procedural style can lead to inflexible and tangled code for managing a crosscutting aspec...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
JSS
2006
104views more  JSS 2006»
13 years 8 months ago
Modelling and simulation of off-chip communication architectures for high-speed packet processors
In this work, we propose a visual, custom-designed, event-driven interconnect simulation framework to evaluate the performance of off-chip multi-processor/memory communications ar...
Jacob Engel, Daniel Lacks, Taskin Koçak