Sciweavers

741 search results - page 108 / 149
» Tools and techniques for Network Forensics
Sort
View
APWEB
2008
Springer
13 years 11 months ago
The Layered World of Scientific Conferences
Recent models have introduced the notion of dimensions and hierarchies in social networks. These models motivate the mining of small world graphs under a new perspective. We exempl...
Michael Kuhn 0002, Roger Wattenhofer
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
RAS
2010
137views more  RAS 2010»
13 years 7 months ago
Development of complex robotic systems using the behavior-based control architecture iB2C
This paper presents a development methodology for complex robotic systems using the behavior-based control architecture iB2C (integrated Behavior-Based Control). It is shown how a...
Martin Proetzsch, Tobias Luksch, Karsten Berns
IACR
2011
124views more  IACR 2011»
12 years 8 months ago
Zero-Correlation Linear Cryptanalysis of Block Ciphers
Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This work introduces a novel extension of linear crypt...
Andrey Bogdanov, Vincent Rijmen
ADT
2011
13 years 14 days ago
Virtual networks: isolation, performance, and trends
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many resea...
Natalia Castro Fernandes, Marcelo D. D. Moreira, I...