Sciweavers

1737 search results - page 72 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ISM
2006
IEEE
92views Multimedia» more  ISM 2006»
14 years 3 months ago
Strategies for Efficient Streaming in Delay-Tolerant Multimedia Applications
We consider Multimedia applications where clients specify a minimum desired stream rate (quality) and a time till when they are willing to wait, termed delay tolerance. The Conten...
Saraswathi Krithivasan, Sridhar Iyer
IPPS
2007
IEEE
14 years 3 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
BMCBI
2008
152views more  BMCBI 2008»
13 years 9 months ago
Predicting biological system objectives de novo from internal state measurements
Background: Optimization theory has been applied to complex biological systems to interrogate network properties and develop and refine metabolic engineering strategies. For examp...
Erwin P. Gianchandani, Matthew A. Oberhardt, Antho...
AINA
2009
IEEE
14 years 4 months ago
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks
In this paper we present a low-complexity traffic prioritization strategy for video transmission using the H.264 scalable video coding (SVC) standard over 802.11e wireless networ...
Dario Gallucci, Attilio Fiandrotti, Enrico Masala,...
MINENET
2006
ACM
14 years 3 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong