Sciweavers

3031 search results - page 394 / 607
» Reuse in the application layer
Sort
View
WIOPT
2010
IEEE
15 years 2 months ago
On capacity achieving property of rotational coding for acyclic deterministic wireless networks
—It has been shown that the well-known cutset bounds can be achieved for deterministic wireless networks by performing random coding at each intermediate node. The complexity and...
Mohammad A. (Amir) Khojastepour, Alireza Keshavarz...
DIMVA
2010
15 years 2 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
FAST
2009
15 years 2 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
IJCAT
2010
80views more  IJCAT 2010»
15 years 1 months ago
Laser remanufacturing based on the integration of reverse engineering and laser cladding
: Laser remanufacturing has been used as an approach to refurbish or to improve the surface quality of high-priced parts. However, most of the existing systems lack measuring and m...
Liangliang Nan, Weijun Liu, Kai Zhang
SCP
2010
123views more  SCP 2010»
14 years 11 months ago
Slicing for architectural analysis
Current software development often relies on non trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such ...
Nuno F. Rodrigues, Luís Soares Barbosa