Sciweavers

412 search results - page 80 / 83
» An evaluation of timed scenario notations
Sort
View
COMCOM
2006
121views more  COMCOM 2006»
14 years 9 months ago
Load-balanced agent activation for value-added network services
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
Chao Gong, Kamil Saraç, Ovidiu Daescu, Bala...
COMSUR
2006
84views more  COMSUR 2006»
14 years 9 months ago
A survey of handover algorithms in DVB-H
Digital Video Broadcasting for Handhelds (DVB-H) is a standard for broadcasting IP Datacast (IPDC) services to mobile handheld terminals. Based on the DVB-T standard, DVB-H adds n...
Xiaodong Yang, Jani Väre, Thomas J. Owens
90
Voted
CTW
2006
112views more  CTW 2006»
14 years 9 months ago
Cross border railway operations: improving safety at cultural interfaces
Organizations with different cultures will be increasingly required to interface with each other as legislation is introduced to ensure the interoperability of railway systems acr...
S. O. Johnsen, J. Vatn, R. Rosness, I. A. Herrera
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
TC
2008
14 years 9 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...