Sciweavers

136 search results - page 10 / 28
» Some characterizations based on double aggregation operators
Sort
View
SIGMETRICS
2011
ACM
296views Hardware» more  SIGMETRICS 2011»
12 years 11 months ago
Cellular data network infrastructure characterization and implication on mobile content placement
Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure o...
Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian...
WCRE
2006
IEEE
14 years 2 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
14 years 1 months ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...
CORR
2007
Springer
116views Education» more  CORR 2007»
13 years 8 months ago
A presentation of Quantum Logic based on an "and then" connective
When a physicist performs a quantic measurement, new information about the system at hand is gathered. This presentation studies the logical properties of how this new information...
Daniel Lehmann
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 8 months ago
A Rule-based Temporal Alert Correlation System
This paper reports a research work to address the problem of the large number of alerts generated by the detectors in an intrusion detection system. Some of these alerts are redun...
Peyman Kabiri, Ali A. Ghorbani