Sciweavers

10 search results - page 2 / 2
» Transient sensitivity computation for transistor level analy...
Sort
View
SECON
2007
IEEE
13 years 11 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
ICDCS
2008
IEEE
13 years 11 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
ISPA
2004
Springer
13 years 10 months ago
Highly Reliable Linux HPC Clusters: Self-Awareness Approach
Abstract. Current solutions for fault-tolerance in HPC systems focus on dealing with the result of a failure. However, most are unable to handle runtime system configuration change...
Chokchai Leangsuksun, Tong Liu, Yudan Liu, Stephen...

Publication
420views
15 years 3 months ago
Adaptive Multilevel Early Congestion Notification
We propose Adaptive Multi-level ECN, a new TCP congestion scheme as an extension to Multi-level Explicit Congestion Notification (MECN). MECN algo- rithm allows network operators t...
A. Durresi, M. Sridharan, Raj Jain
TRIDENTCOM
2006
IEEE
13 years 11 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff