Sciweavers

589 search results - page 95 / 118
» Accurate Dependability Analysis of CAN-Based Networked Syste...
Sort
View
CCS
2003
ACM
15 years 7 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
IJSNET
2011
110views more  IJSNET 2011»
14 years 9 months ago
Sensor integration for perinatology research
— The numbers of high-risk pregnancies and premature births are increasing due to the steadily higher age at which women get pregnant. The long-term quality of life of the neonat...
Wei Chen, Jun Hu, Sibrecht Bouwstra, Sidarto Bamba...
FPL
2006
Springer
124views Hardware» more  FPL 2006»
15 years 5 months ago
A Dynamically Reconfigurable Queue Scheduler
In this paper we present the design and implementation of a dynamically reconfigurable system for packet queue scheduling. Two widely accepted queue schedulers have been implement...
Christoforos Kachris, Stamatis Vassiliadis
TPDS
2002
126views more  TPDS 2002»
15 years 1 months ago
P-3PC: A Point-to-Point Communication Model for Automatic and Optimal Decomposition of Regular Domain Problems
One of the most fundamental problems automatic parallelization tools are confronted with is to find an optimal domain decomposition for a given application. For regular domain prob...
Frank J. Seinstra, Dennis Koelma
HUC
2010
Springer
15 years 13 days ago
Vehicular speed estimation using received signal strength from mobile phones
This paper introduces an algorithm that estimates the speed of a mobile phone by matching time-series signal strength data to a known signal strength trace from the same road. Kno...
Gayathri Chandrasekaran, Tam Vu, Alexander Varshav...