Sciweavers

741 search results - page 72 / 149
» Tools and techniques for Network Forensics
Sort
View
CASES
2007
ACM
14 years 28 days ago
Performance-driven syntax-directed synthesis of asynchronous processors
The development of robust and efficient synthesis tools is important if asynchronous design is to gain more widespread acceptance. Syntax-directed translation is a powerful synthe...
Luis A. Plana, Doug A. Edwards, Sam Taylor, Luis A...
IMC
2009
ACM
14 years 3 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 3 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
ICCD
2004
IEEE
134views Hardware» more  ICCD 2004»
14 years 5 months ago
An Automatic Test Pattern Generation Framework for Combinational Threshold Logic Networks
— We propose an automatic test pattern generation (ATPG) framework for combinational threshold networks. The motivation behind this work lies in the fact that many emerging nanot...
Pallav Gupta, Rui Zhang, Niraj K. Jha
SAC
2009
ACM
14 years 1 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell