Sciweavers

1722 search results - page 186 / 345
» Dedication
Sort
View
DSN
2005
IEEE
15 years 6 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
92
Voted
FDL
2005
IEEE
15 years 6 months ago
Implementation of a SystemC based Environment
Verification and validation are key issues for today's SoC design projects. This paper presents the implementation of a SystemC based environment for transaction-based verifi...
Richard Hoffer, Frank Baszynski
101
Voted
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
15 years 6 months ago
MobCon: A Generative Middleware Framework for Java Mobile Applications
While dedicated technologies such as e.g., Sun’s J2ME MIDP offer a simple programming model for mobile applications, appropriate support for modularizing the implementation of t...
Vasian Cepa, Mira Mezini
HOTI
2005
IEEE
15 years 6 months ago
Design of Randomized Multichannel Packet Storage for High Performance Routers
High performance routers require substantial amounts of memory to store packets awaiting transmission, requiring the use of dedicated memory devices with the density and capacity ...
Sailesh Kumar, Patrick Crowley, Jonathan S. Turner
ICMCS
2005
IEEE
105views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Streaming layered encoded video using peers
Peer-to-peer video streaming has emerged as an important means to transport stored video. The peers are less costly and more scalable than an infrastructure-basedvideo streaming n...
Yanming Shen, Zhengye Liu, Shivendra S. Panwar, Ke...