Sciweavers

734 search results - page 77 / 147
» A Novel Quantitative Approach For Measuring Network Security
Sort
View
TOG
2010
126views more  TOG 2010»
14 years 4 months ago
Automatic generation of destination maps
Destination maps are navigational aids designed to show anyone within a region how to reach a location (the destination). Handdesigned destination maps include only the most impor...
Johannes Kopf, Maneesh Agrawala, David Bargeron, D...
CONEXT
2005
ACM
14 years 11 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
CNSR
2004
IEEE
15 years 1 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
15 years 2 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
AAAI
2004
14 years 11 months ago
Distributed Representation of Syntactic Structure by Tensor Product Representation and Non-Linear Compression
Representing lexicons and sentences with the subsymbolic approach (using techniques such as Self Organizing Map (SOM) or Artificial Neural Network (ANN)) is a relatively new but i...
Heidi H. T. Yeung, Peter W. M. Tsang