Sciweavers

124 search results - page 15 / 25
» Towards Design Recovery from Observations
Sort
View
QEST
2005
IEEE
14 years 1 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
MICCAI
2009
Springer
14 years 9 months ago
Modeling Adaptation Effects in fMRI Analysis
The standard general linear model (GLM) for rapid event-related fMRI design protocols typically ignores reduction in hemodynamic responses in successive stimuli in a train due to i...
Wanmei Ou, Tommi Raij, Fa-Hsuan Lin, Polina Gollan...
IACR
2011
104views more  IACR 2011»
12 years 7 months ago
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere
PRINTcipher is a recent lightweight block cipher designed by Knudsen et al. Some noteworthy characteristics are a burnt-in key, a key-dependent permutation layer and identical roun...
Martin Ågren, Thomas Johansson
ICC
2008
IEEE
137views Communications» more  ICC 2008»
14 years 2 months ago
On the Effect of Localization Errors on Geographic Routing in Sensor Networks
—Recently, network localization systems that are based on inter-node ranges have received significant attention. Geographic routing has been considered an application which can u...
Bo Peng, Rainer Mautz, Andrew H. Kemp, Washington ...
VIROLOGY
2008
68views more  VIROLOGY 2008»
13 years 7 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...