Sciweavers

219 search results - page 2 / 44
» Highly efficient techniques for network forensics
Sort
View
DAC
2001
ACM
14 years 6 months ago
Publicly Detectable Techniques for the Protection of Virtual Components
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
Gang Qu
TIFS
2010
127views more  TIFS 2010»
13 years 4 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
WSC
2004
13 years 7 months ago
New Event-driven Sampling Techniques for Network Reliability Estimation
Exactly computing network reliability measures is an NPhard problem. Therefore, Monte Carlo simulation has been frequently used by network designers to obtain accurate estimates. ...
Abdullah Konak, Alice E. Smith, Sadan Kulturel-Kon...
DSN
2006
IEEE
13 years 9 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman

Publication
177views
15 years 4 months ago
Terabit Switching: A Survey of Techniques and Current Products
This survey paper explains the issues in designing terabit routers and the solutions for them. The discussion includes multi-layer switching, route caching, label switching, and ef...
Amit Singhal, Raj Jain