Sciweavers

3898 search results - page 567 / 780
» Maintaining Component-Based Systems
Sort
View
ISPASS
2008
IEEE
15 years 10 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
SCAM
2008
IEEE
15 years 10 months ago
An Empirical Study of Function Overloading in C++
The usefulness and usability of programming tools (for example, languages, libraries, and frameworks) may greatly impact programmer productivity and software quality. Ideally, the...
Cheng Wang, Daqing Hou
SECON
2008
IEEE
15 years 10 months ago
Analytical Study of Collaborative Information Coverage for Object Detection in Sensor Networks
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Guanqun Yang, Vinod Shukla, Daji Qiao
SECURWARE
2008
IEEE
15 years 10 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
VTC
2008
IEEE
186views Communications» more  VTC 2008»
15 years 10 months ago
Downlink Limited Feedback Transmission Schemes for Asymmetric MIMO Channels
Abstract—In multiple-input multiple-output (MIMO) broadcast channels, multiuser diversity is exploited by scheduling data transmission to users with best channel conditions. To ...
Mohsen Eslami, Witold A. Krzymien