Sciweavers

1336 search results - page 209 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
GLOBECOM
2009
IEEE
15 years 7 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
127
Voted
WSC
1994
15 years 4 months ago
AutoStat
Whether designing a new system or modifying an existing one, engineers want to take the guesswork out of finding the best possible solution. While there are many analysis methods ...
Matthew W. Rohrer
145
Voted
SEBD
1997
134views Database» more  SEBD 1997»
15 years 4 months ago
A Systematic Approach to Multidimensional Databases
Abstract. Multidimensional databases are large collections of data, often historical, used for sophisticated analysis oriented to decision making. This activity is supported by an ...
Luca Cabibbo, Riccardo Torlone
IAJIT
2010
87views more  IAJIT 2010»
15 years 1 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
120
Voted
WSC
1997
15 years 4 months ago
Creating a Flexible, Simulation-Based Finite Scheduling Tool
Today's business climate for manufacturers requires low inventory, quick response systems that turn out a wide variety of products. Since many companies are reaching physical...
Barbara W. Mazziotti, Richard E. Horne Jr.