Sciweavers

741 search results - page 90 / 149
» Tools and techniques for Network Forensics
Sort
View
DSN
2002
IEEE
14 years 1 months ago
Detecting Processor Hardware Faults by Means of Automatically Generated Virtual Duplex Systems
A virtual duplex system (VDS) can be used to increase safety without the use of structural redundancy on a single machine. If a deterministic program P is calculating a given func...
Markus Jochim
WCE
2007
13 years 10 months ago
Constrained Path Optimisation for Underground Mine Layout
Abstract—The major infrastructure component required to develop an underground mine is a decline, which is a system of tunnels used for access and haulage. In this paper we study...
Marcus Brazil, P. A. Grossman, D. H. Lee, J. H. Ru...
SETN
2004
Springer
14 years 2 months ago
Computationally Intelligent Methods for Mining 3D Medical Images
We present novel intelligent tools for mining 3D medical images. We focus on detecting discriminative Regions of Interest (ROIs) and mining associations between their spatial distr...
Despina Kontos, Vasileios Megalooikonomou, Fillia ...
EL
2008
184views more  EL 2008»
13 years 9 months ago
Breedbot: an evolutionary robotics application in digital content
Research paper Purpose of this paper This paper describe an integrated hardware/software system based on Evolutionary Robotics and its application in Edutainment context. Design/me...
Orazio Miglino, Onofrio Gigliotta, Michela Pontico...
SIGCOMM
2004
ACM
14 years 2 months ago
Locating internet bottlenecks: algorithms, measurements, and implications
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interest to both network operators and researchers. For example, knowing where bottlen...
Ningning Hu, Erran L. Li, Zhuoqing Morley Mao, Pet...