Sciweavers

255 search results - page 43 / 51
» Timing Anomalies Reloaded
Sort
View
TPDS
2008
130views more  TPDS 2008»
13 years 10 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
TVCG
2008
121views more  TVCG 2008»
13 years 10 months ago
Multi-Focused Geospatial Analysis Using Probes
Traditional geospatial information visualizations often present views that restrict the user to a single perspective. When zoomed out, local trends and anomalies become suppressed ...
Thomas Butkiewicz, Wenwen Dou, Zachary Wartell, Wi...
CCE
2004
13 years 10 months ago
New measures and procedures to manage financial risk with applications to the planning of gas commercialization in Asia
This paper presents some new concepts and procedures for financial risk management. To complement the use of value at risk a new concept, upside potential or opportunity value as ...
Ahmed Aseeri, Miguel J. Bagajewicz
CCR
2004
79views more  CCR 2004»
13 years 10 months ago
Preventing Internet denial-of-service with capabilities
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) attacks. Instead of being able to send anything to anyone at any time, in our archi...
Thomas E. Anderson, Timothy Roscoe, David Wetheral...
RTAS
2010
IEEE
13 years 8 months ago
Scheduling Dependent Periodic Tasks without Synchronization Mechanisms
—This article studies the scheduling of critical embedded systems, which consist of a set of communicating periodic tasks with constrained deadlines. Currently, tasks are usually...
Julien Forget, Frédéric Boniol, Emma...