Sciweavers

1411 search results - page 149 / 283
» On the modelling and performance evaluation of optical burst...
Sort
View
CN
2007
80views more  CN 2007»
13 years 9 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
ICPPW
2003
IEEE
14 years 2 months ago
Parallelization of Cellular Neural Networks for Image Processing on Cluster Architectures
In this paper a simple but effective approach for parallelization of cellular neural networks for image processing is developed. Digital gray-scale images were used to evaluate th...
Thomas Weishäupl, Erich Schikuta
ICONIP
2004
13 years 10 months ago
In-vehicle Noise and Enhanced Speech Intelligibility
In-Car speech recognition will be pervasive over the coming years. The goal of speech enhancement is to increase the quality and intelligibility of speech in a noisy environment. T...
Akbar Ghobakhlou, Richard Kilgour
INFOCOM
2006
IEEE
14 years 3 months ago
TWINE: A Hybrid Emulation Testbed for Wireless Networks and Applications
In this paper, we present a high fidelity and efficient emulation framework called TWINE, which combines the accuracy and realism of emulated and physical networks and the scala...
Junlan Zhou, Zhengrong Ji, Rajive Bagrodia
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh