Sciweavers

1737 search results - page 268 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
111
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Looking at Large Networks: Coding vs. Queueing
— Traditionally, network buffer resources have been used at routers to queue transient packets to prevent packet drops. In contrast, we propose a scheme for large multi-hop netwo...
Sandeep Bhadra, Sanjay Shakkottai
OOPSLA
2004
Springer
15 years 7 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
TON
2010
147views more  TON 2010»
15 years 26 days ago
Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach
—In this paper, we investigate the maximization of the coverage time for a clustered wireless sensor network (WSN) by optimal balancing of power consumption among cluster heads (...
Tao Shu, Marwan Krunz
BMCBI
2008
107views more  BMCBI 2008»
15 years 2 months ago
A machine learning approach to explore the spectra intensity pattern of peptides using tandem mass spectrometry data
Background: A better understanding of the mechanisms involved in gas-phase fragmentation of peptides is essential for the development of more reliable algorithms for high-throughp...
Cong Zhou, Lucas D. Bowler, Jianfeng Feng
ACSAC
2003
IEEE
15 years 6 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...