Sciweavers

1875 search results - page 215 / 375
» Automatic Network Protocol Analysis
Sort
View
145
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
145
Voted
BMCBI
2005
250views more  BMCBI 2005»
15 years 3 months ago
FiatFlux - a software for metabolic flux analysis from 13C-glucose experiments
Background: Quantitative knowledge of intracellular fluxes is important for a comprehensive characterization of metabolic networks and their functional operation. In contrast to d...
Nicola Zamboni, Eliane Fischer, Uwe Sauer
106
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
Worst-Case optimal and average-case efficient geometric ad-hoc routing
In this paper we present GOAFR, a new geometric ad-hoc routing algorithm combining greedy and face routing. We evaluate this algorithm by both rigorous analysis and comprehensive ...
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
169
Voted
IMC
2006
ACM
15 years 9 months ago
Delving into internet streaming media delivery: a quality and resource utilization perspective
Modern Internet streaming services have utilized various techniques to improve the quality of streaming media delivery. Despite the characterization of media access patterns and u...
Lei Guo, Enhua Tan, Songqing Chen, Zhen Xiao, Oliv...
121
Voted
ICNP
2005
IEEE
15 years 9 months ago
Priority Pricing in Utility Fair Networks
This paper deals with a new pricing approach in utility fair networks, where the user’s application is associated with a utility function. We allow users to have concave as well...
Tobias Harks, Tobias Poschwatta