Sciweavers

2200 search results - page 319 / 440
» Hop Integrity in Computer Networks
Sort
View
103
Voted
PRL
2006
105views more  PRL 2006»
15 years 3 months ago
Parisian camera placement for vision metrology
This paper presents a novel camera network design methodology based on the Parisian evolutionary computation approach. This methodology proposes to partition the original problem ...
Enrique Dunn, Gustavo Olague, Evelyne Lutton
137
Voted
CORR
2004
Springer
146views Education» more  CORR 2004»
15 years 3 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
ICNP
2009
IEEE
15 years 1 months ago
Quality of Name Resolution in the Domain Name System
The Domain Name System (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. I...
Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Kri...
IEEEARES
2009
IEEE
15 years 10 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
DAC
1999
ACM
16 years 4 months ago
A Novel VLSI Layout Fabric for Deep Sub-Micron Applications
We propose a new VLSI layout methodology which addresses the main problems faced in Deep Sub-Micron (DSM) integrated circuit design. Our layout "fabric" scheme eliminate...
Sunil P. Khatri, Amit Mehrotra, Robert K. Brayton,...