Sciweavers

1486 search results - page 129 / 298
» Firewall Rules Analysis
Sort
View
145
Voted
JSS
2010
208views more  JSS 2010»
15 years 2 months ago
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks
This paper investigates a class of mobile wireless sensor networks that are unconnected most of the times; we refer to them as delay–tolerant wireless sensor networks (DTWSN). T...
Abbas Nayebi, Hamid Sarbazi-Azad, Gunnar Karlsson
GLOBECOM
2010
IEEE
15 years 2 months ago
Modeling and Analysis for Reactive-Decision Spectrum Handoff in Cognitive Radio Networks
This paper investigates how to characterize the effect of multiple spectrum handoff delay on the extended data delivery time of the secondary users' connections in cognitive r...
Chung-Wei Wang, Li-Chun Wang, Fumiyuki Adachi
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ICFCA
2007
Springer
15 years 10 months ago
A Parameterized Algorithm for Exploring Concept Lattices
Kuznetsov shows that Formal Concept Analysis (FCA) is a natural framework for learning from positive and negative examples. Indeed, the results of learning from positive examples (...
Peggy Cellier, Sébastien Ferré, Oliv...
WSC
2000
15 years 5 months ago
A comparison of five steady-state truncation heuristics for simulation
We compare the performance of five well-known truncation heuristics for mitigating the effects of initialization bias in the output analysis of steady-state simulations. Two of th...
K. Preston White, Michael J. Cobb, Stephen C. Spra...