Sciweavers

3785 search results - page 706 / 757
» Immune System Based Intrusion Detection System
Sort
View
DSN
2003
IEEE
15 years 5 months ago
N-Way Fail-Over Infrastructure for Reliable Servers and Routers
Maintaining the availability of critical servers and routers is an important concern for many organizations. At the lowest level, IP addresses represent the global namespace by wh...
Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schloss...
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 5 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
DSOM
2003
Springer
15 years 5 months ago
A Method on Multimedia Service Traffic Monitoring and Analysis
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on netw...
Hun-Jeong Kang, Myung-Sup Kim, James Won-Ki Hong
ISORC
1998
IEEE
15 years 4 months ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz
ACCV
1998
Springer
15 years 4 months ago
Comparison of Mean Field Annealing and Multiresolution Analysis in Missing Data Estimation
The project we are working on is to help develop and test a low cost, large area, high resolution X-ray detection system with a high dynamic range. The large area is achieved by b...
Hairong Qi, Wesley E. Snyder, Griff L. Bilbro