Sciweavers

3910 search results - page 33 / 782
» Analyzing Cross-Connected Networks
Sort
View
ICNP
2007
IEEE
15 years 11 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui
BIBE
2006
IEEE
139views Bioinformatics» more  BIBE 2006»
15 years 11 months ago
A Computational Inference Framework for analyzing Gene Regulation Pathway using Microarray Data
Microarray experiments produce gene expression data at such a high speed and volume that it is imperative to use highly specialized computational tools for their analyses. One grou...
Dong-Guk Shin, John Bluis, Yoo Ah Kim, Winfried Kr...
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 9 months ago
The Degree Sequence of Random Apollonian Networks
We analyze the asymptotic behavior of the degree sequence of Random Apollonian Networks [11]. For previous weaker results see [10, 11].
Charalampos E. Tsourakakis
ACSAC
2007
IEEE
15 years 11 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 11 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang