Sciweavers

741 search results - page 111 / 149
» Tools and techniques for Network Forensics
Sort
View
CMG
2003
13 years 10 months ago
{Performance Modeling and Evaluation of Large-Scale J2EE Applications
The queueing Petri net (QPN) paradigm provides a number of benefits over conventional modeling paradigms such as queueing networks and generalized stochastic Petri nets. Using qu...
Samuel Kounev, Alejandro P. Buchmann
KES
2007
Springer
13 years 8 months ago
An Application of Machine Learning Methods to PM10 Level Medium-Term Prediction
The study described in this paper, analyzed the urban and suburban air pollution principal causes and identified the best subset of features (meteorological data and air pollutants...
Giovanni Raimondo, Alfonso Montuori, Walter Moniac...
ICASSP
2011
IEEE
13 years 17 days ago
Rate control for PSD limited multiple access systems through linear programming
In this paper we discuss rate control for multiuser multicarrier systems, where the transmitter has a single antenna and is subject to a PSD mask limitation while the receiver has...
Amir Leshem, Ephraim Zehavi
IMC
2009
ACM
14 years 3 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
CSFW
2007
IEEE
14 years 3 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...