Sciweavers

7587 search results - page 1362 / 1518
» Network Analysis and Visualisation
Sort
View
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 1 months ago
Experimental Studies and Modeling of an Information Embedded Power System
This paper develops a model of an electrical power system, with its inherent embedded communication system, for the purpose of studying the characteristics of power system measure...
Stephen P. Carullo, Chika Nwankpa
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
14 years 1 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...
ISCC
2003
IEEE
14 years 1 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
SRDS
2003
IEEE
14 years 1 months ago
Group Communication Protocols under Errors
Group communication protocols constitute a basic building block for highly dependable distributed applications. Designing and correctly implementing a group communication system (...
Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ra...
IMC
2003
ACM
14 years 1 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
« Prev « First page 1362 / 1518 Last » Next »