Sciweavers

7544 search results - page 1345 / 1509
» Network Forensics Analysis
Sort
View
IJCNN
2006
IEEE
15 years 10 months ago
Extraction of Components with Structured Variance
Abstract— We present a method for exploratory data analysis of large spatiotemporal data sets such as global longtime climate measurements, extending our previous work on semibli...
Alexander Ilin, Harri Valpola, Erkki Oja
IJCNN
2006
IEEE
15 years 10 months ago
Markov Coding Strategy of the Simple Spiking Model of Auditory Neuron
— The present paper is devoted to the exploration of the properties of the simple spiking neuron model and quantification of the information transfer rate, which the separate neu...
Alexei V. Ivanov, Alexander A. Petrovsky
125
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
130
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
A Comparative Study of the DNS Design with DHT-Based Alternatives
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
Vasileios Pappas, Daniel Massey, Andreas Terzis, L...
IPPS
2006
IEEE
15 years 10 months ago
On collaborative content distribution using multi-message gossip
We study epidemic schemes in the context of collaborative data delivery. In this context, multiple chunks of data reside at different nodes, and the challenge is to simultaneousl...
Yaacov Fernandess, Dahlia Malkhi
« Prev « First page 1345 / 1509 Last » Next »