Sciweavers

2351 search results - page 384 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
COMPSAC
2007
IEEE
15 years 4 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
HICSS
2007
IEEE
172views Biometrics» more  HICSS 2007»
15 years 4 months ago
Support for Computer Forensics Examination Planning with Domain Modeling: A Report of One Experiment Trial
In any forensic investigation, planning and analysis activities are required in order to determine what digital media will be seized, what types of information will be sought in t...
Alfred C. Bogen, David A. Dampier, Jeffrey C. Carv...
IAT
2007
IEEE
15 years 4 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
IPPS
2007
IEEE
15 years 4 months ago
Fast SEU Detection and Correction in LUT Configuration Bits of SRAM-based FPGAs
1 FPGAs are an appealing solution for the space-based remote sensing applications. However, in a low-earth orbit, configuration bits of SRAM-based FPGAs are susceptible to single-e...
Hamid R. Zarandi, Seyed Ghassem Miremadi, Costas A...
MUE
2007
IEEE
106views Multimedia» more  MUE 2007»
15 years 4 months ago
PKTown: A Peer-to-Peer Middleware to Support Multiplayer Online Games
Peer-to-Peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for Multiplayer Onl...
Hai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei L...