Sciweavers

1318 search results - page 245 / 264
» Measuring network security using dynamic bayesian network
Sort
View
IJON
2007
83views more  IJON 2007»
13 years 7 months ago
Phase synchronization between LFP and spiking activity in motor cortex during movement preparation
A common approach to measure and assess cortical dynamics focuses on the analysis of mass signals, such as the local field potential (LFP), as an indicator for the underlying net...
Michael Denker, Sébastien Roux, Marc Timme,...
MMS
1998
13 years 7 months ago
Packet Audio Playout Delay Adjustment: Performance Bounds and Algorithms
In packet audio applications, packets are buffered at a receiving site and their playout delayed in order to compensate for variable network delays. In this paper, we consider the ...
Sue B. Moon, James F. Kurose, Donald F. Towsley
SPAA
2009
ACM
14 years 2 months ago
Distributed algorithms for QoS load balancing
We consider a dynamic load balancing scenario in which users allocate resources in a non-cooperative and selfish fashion. The perceived performance of a resource for a user decre...
Heiner Ackermann, Simon Fischer, Martin Hoefer, Ma...
SIGSOFT
2008
ACM
14 years 8 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 1 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar