Sciweavers

7544 search results - page 1284 / 1509
» Network Forensics Analysis
Sort
View
USS
2004
15 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
ADHOC
2010
138views more  ADHOC 2010»
15 years 5 months ago
On the feasibility of UMTS-based Traffic Information Systems
Intelligent Transportation Systems (ITS) are a hot topic in the communications society. Currently, research is primarily focusing on setting up Vehicular Ad Hoc Networks (VANETs) ...
Christoph Sommer, Armin Schmidt, Yi Chen, Reinhard...
BMCBI
2010
133views more  BMCBI 2010»
15 years 5 months ago
Predicting enzyme targets for cancer drugs by profiling human Metabolic reactions in NCI-60 cell lines
Background: Drugs can influence the whole metabolic system by targeting enzymes which catalyze metabolic reactions. The existence of interactions between drugs and metabolic react...
Limin Li, Xiaobo Zhou, Wai-Ki Ching, Ping Wang
CCR
2008
76views more  CCR 2008»
15 years 5 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford
CORR
2010
Springer
182views Education» more  CORR 2010»
15 years 5 months ago
Index coding via linear programming
Abstract Anna Blasiak Robert Kleinberg Eyal Lubetzky Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and e...
Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky
« Prev « First page 1284 / 1509 Last » Next »