Sciweavers

1869 search results - page 268 / 374
» Analysis of Network Processing Workloads
Sort
View
CCS
2008
ACM
15 years 5 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
FGCN
2008
IEEE
153views Communications» more  FGCN 2008»
15 years 9 months ago
Experimental Study on Neuronal Spike Sorting Methods
When recording extracellular neural activity, it is often necessary to distinguish action potentials arising from distinct cells near the electrode tip, a process commonly referre...
Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, ...
DSN
2007
IEEE
15 years 9 months ago
How to Choose a Timing Model?
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
153
Voted
CMSB
2007
Springer
15 years 9 months ago
Context Sensitivity in Logical Modeling with Time Delays
For modeling and analyzing regulatory networks based on qualitative information and possibly additional temporal constraints, approaches using hybrid automata can be very helpful. ...
Heike Siebert, Alexander Bockmayr
WMTE
2006
IEEE
15 years 9 months ago
Implementation of Intelligent Agents with Mobility in Educational Robotics Settings
Teachers working in robotics classes face a major problem: how to keep track on individual students’ or even small groups’ progress in a class of 30-40 students. A multi-agent...
Ilkka Jormanainen, Chiara Moroni, Yuejun Zhang, Ki...