Sciweavers

7544 search results - page 1329 / 1509
» Network Forensics Analysis
Sort
View
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 11 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
ESORICS
2009
Springer
15 years 11 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
142
Voted
GIS
2009
ACM
15 years 11 months ago
Proximate sensing using georeferenced community contributed photo collections
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Daniel Leung, Shawn Newsam
139
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
An Auction-Based Incentive Mechanism for Non-Altruistic Cooperative ARQ via Spectrum-Leasing
— We propose and analyze a novel decentralized mechanism that motivates otherwise non-cooperative stations to participate as relays in cooperative ARQ protocol. Cooperation incen...
Igor Stanojev, Osvaldo Simeone, Umberto Spagnolini...
GLVLSI
2009
IEEE
164views VLSI» more  GLVLSI 2009»
15 years 11 months ago
Capturing topology-level implications of link synthesis techniques for nanoscale networks-on-chip
In the context of nanoscale networks-on-chip (NoCs), each link implementation solution is not just a specific synthesis optimization technique with local performance and power im...
Daniele Ludovici, Georgi Nedeltchev Gaydadjiev, Da...
« Prev « First page 1329 / 1509 Last » Next »