Sciweavers

2715 search results - page 340 / 543
» Network bucket testing
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 4 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
NOCS
2007
IEEE
14 years 3 months ago
Towards Open Network-on-Chip Benchmarks
Measuring and comparing performance, cost, and other features of advanced communication architectures for complex multi core/multiprocessor systems on chip is a significant challe...
Cristian Grecu, André Ivanov, Partha Pratim...
IFIP
2007
Springer
14 years 3 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...
ISPA
2007
Springer
14 years 3 months ago
ECG Anomaly Detection via Time Series Analysis
—Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g...
Mooi Choo Chuah, Fen Fu