Sciweavers

5084 search results - page 1002 / 1017
» Proving Possibility Properties
Sort
View
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 10 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
TASE
2008
IEEE
13 years 10 months ago
Lean Buffering in Serial Production Lines With Nonidentical Exponential Machines
Lean buffering is the smallest buffer capacity, which is necessary and sufficient to ensure the desired production rate of a manufacturing system. Literature offers methods for des...
Shu-Yin Chiang, Alexander Hu, Semyon M. Meerkov
BMCBI
2005
120views more  BMCBI 2005»
13 years 10 months ago
Robust detection of periodic time series measured from biological systems
Background: Periodic phenomena are widespread in biology. The problem of finding periodicity in biological time series can be viewed as a multiple hypothesis testing of the spectr...
Miika Ahdesmäki, Harri Lähdesmäki, ...
« Prev « First page 1002 / 1017 Last » Next »