Sciweavers

187 search results - page 7 / 38
» On the characterizations of (S, N)-implications
Sort
View
ICNS
2007
IEEE
14 years 2 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
IJIT
2004
13 years 9 months ago
Adaptive Algorithm to Predict the QoS of Web Processes and Workflows
Workflow Management Systems (WfMS) allow organizations to streamline and automate business processes and reengineer their structure. One important requirement for this type of syst...
Jorge Cardoso
BMCBI
2004
94views more  BMCBI 2004»
13 years 7 months ago
The MB2 gene family of Plasmodium species has a unique combination of S1 and GTP-binding domains
Background: Identification and characterization of novel Plasmodium gene families is necessary for developing new anti-malarial therapeutics. The products of the Plasmodium falcip...
Lisa C. Romero, Thanh Vinh Nguyen, Benoit Deville,...
TCOM
2010
141views more  TCOM 2010»
13 years 2 months ago
Mutual Information Statistics and Beamforming Performance Analysis of Optimized LoS MIMO Systems
Abstract--This paper provides a systematic mutual information (MI) and multichannel beamforming (MBF) characterization of optimized multiple-input multiple-output (MIMO) communicat...
Michail Matthaiou, Paul de Kerret, George K. Karag...

Publication
96views
13 years 7 months ago
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BitTorrent is currently one of the most popular peer-to-peer systems. BitTorrent clients are widely spread all over the world and account for a large fraction of today’s Internet...
Karim El Defrawy, Minas Gjoka, Athina Markopoulou