Sciweavers

832 search results - page 91 / 167
» Characteristic Patterns for LTL
Sort
View
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 11 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
CLUSTER
2008
IEEE
15 years 10 months ago
Multistage switches are not crossbars: Effects of static routing in high-performance networks
Abstract—Multistage interconnection networks based on central switches are ubiquitous in high-performance computing. Applications and communication libraries typically make use o...
Torsten Hoefler, Timo Schneider, Andrew Lumsdaine
IISWC
2008
IEEE
15 years 10 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
GLOBECOM
2007
IEEE
15 years 10 months ago
A Group of People Acts like a Black Body in a Wireless Mesh Network
Abstract— A Wireless Mesh Network (WMN) is being considered for commercial use in spite of several unaddressed issues. In this paper we focus on one of the most critical issues: ...
Sachin Lal Shrestha, Anseok Lee, Jinsung Lee, Dong...
INFOCOM
2007
IEEE
15 years 10 months ago
PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming
Abstract—The success of swarming content delivery has motivated a new approach to live Peer-to-Peer (P2P) streaming that we call mesh-based streaming. In this approach, participa...
Nazanin Magharei, Reza Rejaie