Sciweavers

2715 search results - page 125 / 543
» Network bucket testing
Sort
View
AINA
2003
IEEE
14 years 2 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
IDEAL
2004
Springer
14 years 2 months ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
HICSS
2002
IEEE
94views Biometrics» more  HICSS 2002»
14 years 2 months ago
The Relationship between Scene and Eye Movements
Individual differences make it difficult to recognize similarities between individuals in eye movement patterns. However, if consistencies can be found, eye movements could be use...
Laurel King
DAC
2009
ACM
14 years 1 months ago
Serial reconfigurable mismatch-tolerant clock distribution
We present an unconventional clock distribution that emphasizes flexibility and layout independence. It suits a variety of applications, clock domain shapes and sizes using a modu...
Atanu Chattopadhyay, Zeljko Zilic
KES
2009
Springer
14 years 1 months ago
Virtual Communities of Practice's Purpose Evolution Analysis Using a Concept-Based Mining Approach
Today, social networks systems have become more and more important. People have change their way to relate and communicate. Therefore, how to enhance contents and organization of a...
Sebastián A. Ríos, Felipe Aguilera, ...