Sciweavers

674 search results - page 106 / 135
» A method proposal for architectural reliability evaluation
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
SENSYS
2004
ACM
15 years 3 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
VLSID
2005
IEEE
150views VLSI» more  VLSID 2005»
15 years 10 months ago
Multivariate Normal Distribution Based Statistical Timing Analysis Using Global Projection and Local Expansion
This paper employs general multivariate normal distribution to develop a new efficient statistical timing analysis methodology. The paper presents the theoretical framework of the...
Baohua Wang, Pinaki Mazumder
DASFAA
2007
IEEE
153views Database» more  DASFAA 2007»
15 years 4 months ago
Interval-Focused Similarity Search in Time Series Databases
Similarity search in time series databases usually deals with comparing entire time series objects or subsequence search. In this paper, we formalize the notion of interval-focused...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...
ICDAR
2005
IEEE
15 years 3 months ago
Towards a Canonical and Structured Representation of PDF Documents through Reverse Engineering
This article presents Xed, a reverse engineering tool for PDF documents, which extracts the original document layout structure. Xed mixes electronic extraction methods with state-...
Maurizio Rigamonti, Jean-Luc Bloechle, Karim Hadja...