Sciweavers

495 search results - page 85 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ICC
2008
IEEE
153views Communications» more  ICC 2008»
14 years 2 months ago
MARIA: Interference-Aware Admission Control and QoS Routing in Wireless Mesh Networks
Abstract— Interference among concurrent transmissions complicates QoS provisioning for multimedia applications in wireless mesh networks. In this paper we propose MARIA (Mesh Adm...
Xiaolin Cheng, Prasant Mohapatra, Sung-Ju Lee, Suj...
VISUALIZATION
2003
IEEE
14 years 28 days ago
Accelerating Large Data Analysis by Exploiting Regularities
We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (al...
David Ellsworth, Patrick J. Moran
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 9 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
VIP
2001
13 years 9 months ago
Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study
Visualisation Systems are in general designed to maximise the cognitive ability of system users particularly when exposed to large sets of otherwise difficult to comprehend data, ...
Andrew Donohoo, Debbie Richards
CIKM
2004
Springer
14 years 1 months ago
The robustness of content-based search in hierarchical peer to peer networks
Hierarchical peer to peer networks with multiple directory services are an important architecture for large-scale file sharing due to their effectiveness and efficiency. Recent ...
M. Elena Renda, Jamie Callan