Sciweavers

1101 search results - page 177 / 221
» heuristics 2007
Sort
View
PAM
2007
Springer
14 years 1 months ago
Neuro-fuzzy Processing of Packet Dispersion Traces for Highly Variable Cross-Traffic Estimation
Cross-traffic data rate over the tight link of a path can be estimated using different active probing packet dispersion techniques. Many of these techniques send large amounts of p...
Marco A. Alzate, Néstor M. Peña, Mig...
PERVASIVE
2007
Springer
14 years 1 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...
POLICY
2007
Springer
14 years 1 months ago
On Automated Policy Generation for Mobile Ad Hoc Networks
In this paper we describe an approach to the problem of automated policy generation for mobile ad hoc networks. The automated policy generation problem is difficult in its own rig...
Cho-Yu Jason Chiang, Gary Levin, Yitzchak Gottlieb...
RAID
2007
Springer
14 years 1 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
SAS
2007
Springer
14 years 1 months ago
Program Analysis Using Symbolic Ranges
Interval analysis seeks static lower and upper bounds on the values of program variables. These bounds are useful, especially for inferring invariants to prove buffer overflow ch...
Sriram Sankaranarayanan, Franjo Ivancic, Aarti Gup...