Sciweavers

3528 search results - page 653 / 706
» A New Approach to Planning in Networks
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
CEC
2005
IEEE
15 years 3 months ago
XCS with computed prediction for the learning of Boolean functions
Computed prediction represents a major shift in learning classifier system research. XCS with computed prediction, based on linear approximators, has been applied so far to functi...
Pier Luca Lanzi, Daniele Loiacono, Stewart W. Wils...
ICMCS
2005
IEEE
183views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Bandwidth Estimation and Robust Video Streaming Over 802.11E Wireless Lans
Streaming high quality audio/video (AV) from home media sources to TV sets over a wireless local area network (WLAN) is a challenging problem because of the fluctuating bandwidth...
Mehmet Umut Demircin, Peter van Beek
ISCA
2005
IEEE
126views Hardware» more  ISCA 2005»
15 years 3 months ago
A Tree Based Router Search Engine Architecture with Single Port Memories
Pipelined forwarding engines are used in core routers to meet speed demands. Tree-based searches are pipelined across a number of stages to achieve high throughput, but this resul...
Florin Baboescu, Dean M. Tullsen, Grigore Rosu, Su...
ISPAN
2005
IEEE
15 years 3 months ago
An Efficient MPI-IO for Noncontiguous Data Access over InfiniBand
Noncontiguous data access is a very common access pattern in many scientific applications. Using POSIX I/O to access many pieces of noncontiguous data segments will generate a lot...
Ding-Yong Hong, Ching-Wen You, Yeh-Ching Chung