Sciweavers

741 search results - page 61 / 149
» Tools and techniques for Network Forensics
Sort
View
QOFIS
2004
Springer
14 years 2 months ago
Evaluating the Utility of Media-Dependent FEC in VoIP Flows
In this paper, we present an analysis of the impact of using media–dependent Forward Error Correction (FEC) in VoIP flows over the Internet. This error correction mechanism cons...
Gerardo Rubino, Martín Varela
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 7 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch
CDC
2010
IEEE
13 years 3 months ago
Vision-based cooperative estimation via multi-agent optimization
Abstract-- In this paper, we investigate a cooperative estimation problem for visual sensor networks based on multiagent optimization techniques. A passivity-based visual motion ob...
Takeshi Hatanaka, Masayuki Fujita, Francesco Bullo
TIT
2008
83views more  TIT 2008»
13 years 8 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck
TOMACS
2002
110views more  TOMACS 2002»
13 years 8 months ago
Rapid model parameterization from traffic measurements
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...
Kun-Chan Lan, John S. Heidemann