Sciweavers

1010 search results - page 37 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ICALT
2003
IEEE
15 years 5 months ago
Students' Understanding of Computer Networks in an Internationally Distributed Course
The different ways in which concepts within computer networks are understood by master level students who take an internationally distributed project-based course have been identi...
Anders Berglund, Arnold Neville Pears
CSB
2003
IEEE
152views Bioinformatics» more  CSB 2003»
15 years 5 months ago
A Parallel Genetic Algorithm for Physical Mapping of Chromosomes
Physical map reconstruction in the presence of errors is a central problem in genetics of high computational complexity. A parallel genetic algorithm for a maximum likelihood esti...
Suchendra M. Bhandarkar, Jinling Huang, Jonathan A...
EUROPKI
2006
Springer
15 years 3 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
DSN
2006
IEEE
15 years 5 months ago
A large-scale study of failures in high-performance computing systems
Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations is publicly avai...
Bianca Schroeder, Garth A. Gibson