Sciweavers

1141 search results - page 123 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
RAID
2007
Springer
15 years 10 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
LCN
2006
IEEE
15 years 10 months ago
Packet Dispersion in IEEE 802.11 Wireless Networks
— Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network env...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
15 years 10 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner
IMC
2003
ACM
15 years 9 months ago
Variability in TCP round-trip times
We measured and analyzed the variability in round trip times (RTTs) within TCP connections using passive measurement techniques. We collected eight hours of bidirectional traces c...
Jay Aikat, Jasleen Kaur, F. Donelson Smith, Kevin ...
CGA
1998
15 years 4 months ago
Composite Lighting Simulations with Lighting Networks
A whole variety of different techniques for simulating global illumination in virtual environments have been developed over recent years. Each technique, including Radiosity, Mont...
Philipp Slusallek, Marc Stamminger, Wolfgang Heidr...