Sciweavers

3686 search results - page 374 / 738
» Comprehensive comprehensions
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
131
Voted
AINA
2008
IEEE
15 years 10 months ago
Live Network Performance Challenge: FLASH-OFDM vs. HSDPA
HSDPA networks are intensively being deployed to provide mobile broadband connectivity to mobile devices. In addition to HSDPA, FLASH-OFDM is another wireless broadband option ope...
Andres Arjona, Antti Ylä-Jääski, Ju...
162
Voted
APCHI
2008
IEEE
15 years 10 months ago
On Generating Backbone Trees through Robust Multi-hop Clusters in Wireless Sensor Networks
Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless...
Inyoung Shin, Moonseong Kim, Hyunseung Choo
102
Voted
CEC
2008
IEEE
15 years 10 months ago
Asynchronous multiple objective particle swarm optimisation in unreliable distributed environments
Abstract— This paper examines the performance characteristics of both asynchronous and synchronous parallel particle swarm optimisation algorithms in heterogeneous, fault-prone e...
Ian Scriven, David Ireland, Andrew Lewis, Sanaz Mo...
139
Voted
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 10 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani