Sciweavers

141 search results - page 8 / 29
» cn 2007
Sort
View
CN
2007
179views more  CN 2007»
13 years 9 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CN
2007
93views more  CN 2007»
13 years 9 months ago
Why TCP timers (still) don't work well
We argue that the design principles of the TCP timeout algorithm are based solely on RTT estimations and may lead to flow synchronization, unnecessary retransmission effort and ...
Ioannis Psaras, Vassilis Tsaoussidis
CN
2007
115views more  CN 2007»
13 years 9 months ago
Cost-effective single-hub WDM ring networks: A proposal and analysis
In this paper, we study a new concept of traffic grooming in wavelength-division multiplexing (WDM) ring networks that aims at eliminating both the bandwidth underutilization and ...
Nizar Bouabdallah, Harry G. Perros
CN
2007
137views more  CN 2007»
13 years 9 months ago
A survey on ultra wide band medium access control schemes
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
Ashima Gupta, Prasant Mohapatra
CN
2007
64views more  CN 2007»
13 years 9 months ago
A taxonomy for identifying requirement interactions in software systems
This paper presents an interaction taxonomy for classifying and identifying requirement interactions in software systems. The proposed taxonomy is in the form of a four-layered py...
Mohamed Shehata, Armin Eberlein, Abraham O. Fapoju...