Sciweavers

7475 search results - page 1471 / 1495
» Supporting use case based requirements engineering
Sort
View
ICC
2007
IEEE
151views Communications» more  ICC 2007»
15 years 10 months ago
Sensing-Throughput Tradeoff for Cognitive Radio Networks
— In cognitive radio networks, the secondary network (users) are allowed to utilize the frequency bands of primary network (users) when they are not currently being used. To supp...
Ying-Chang Liang, Yonghong Zeng, Edward Chu Yeow P...
161
Voted
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 10 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ER
2007
Springer
97views Database» more  ER 2007»
15 years 10 months ago
Towards Active Conceptual Modelling for Sudden Events
There are a number of issues for information systems which are required to collect data urgently that are not well accommodated by current conceptual modelling methodologies and a...
John F. Roddick, Aaron Ceglar, Denise de Vries
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 10 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
MIDDLEWARE
2007
Springer
15 years 10 months ago
A piggybacking approach to reduce overhead in sensor network gossiping
Many wireless sensor network protocols are employing gossipbased message dissemination, where nodes probabilistically forward messages, to reduce message overhead. We are concerne...
Ercan Ucan, Nathanael Thompson, Indranil Gupta
« Prev « First page 1471 / 1495 Last » Next »