Sciweavers

10602 search results - page 2063 / 2121
» Weakly Useful Sequences
Sort
View
INFOCOM
2008
IEEE
15 years 11 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
NDSS
2008
IEEE
15 years 11 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ACRI
2008
Springer
15 years 11 months ago
On the Representation of Gliders in Rule 54 by De Bruijn and Cycle Diagrams
Abstract. Rule 54, in Wolfram’s notation, is one of elementary yet complexly behaving one-dimensional cellular automata. The automaton supports gliders, glider guns and other non...
Genaro Juárez Martínez, Andrew Adama...
ICC
2007
IEEE
200views Communications» more  ICC 2007»
15 years 11 months ago
Optimal Packet Scheduling for Multi-Description Multi-Path Video Streaming Over Wireless Networks
—As developments in wireless networks continue, there is an increasing expectation with regard to supporting highquality real-time video streaming service in such networks. The r...
Gui Xie, M. N. S. Swamy, M. Omair Ahmad
INFOCOM
2007
IEEE
15 years 11 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
« Prev « First page 2063 / 2121 Last » Next »