Sciweavers

2715 search results - page 339 / 543
» Network bucket testing
Sort
View
NDSS
2009
IEEE
14 years 4 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
CDC
2008
IEEE
174views Control Systems» more  CDC 2008»
14 years 4 months ago
Consensus under communication delays
— This paper deals with the consensus problem under communication network inducing delays. It is well-known that introducing a delay leads in general to a reduction of the perfor...
Alexandre Seuret, Dimos V. Dimarogonas, Karl Henri...
COMSWARE
2008
IEEE
14 years 4 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
ACISICIS
2007
IEEE
14 years 4 months ago
An Integrated Haptic Data Transmission in Haptic Collaborative Virtual Environments
Haptic Collaboration Virtual Environment (HCVE) is an enhanced virtual reality space with haptic interface support. HCVE users are connected together over the network and are able...
Yonghee You, Mee Young Sung, Kyungkoo Jun