Sciweavers

7544 search results - page 182 / 1509
» Network Forensics Analysis
Sort
View
161
Voted
WIMOB
2007
IEEE
15 years 10 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
ICMCS
2005
IEEE
109views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Real-Time and Distributed AV Content Analysis System for Consumer Electronics Networks
The ever-increasing complexity of generic MultimediaContent-Analysis-based (MCA) solutions, their processing power demanding nature and the need to prototype and assess solutions ...
Jan Nesvadba, Pedro Fonseca, Alexander Sinitsyn, F...
125
Voted
IPPS
2005
IEEE
15 years 9 months ago
Technology-based Architectural Analysis of Operand Bypass Networks for Efficient Operand Transport
As semiconductor feature sizes decrease, interconnect delay is becoming a dominant component of processor cycle times. This creates a critical need to shift microarchitectural des...
Hongkyu Kim, D. Scott Wills, Linda M. Wills
145
Voted
WIOPT
2005
IEEE
15 years 9 months ago
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
Using decentralized reputation systems is a promising approach to ensuring cooperation and fairness in Mobile Ad-Hoc Networks. However, they are vulnerable to liars and robustness...
Jochen Mundinger, Jean-Yves Le Boudec
141
Voted
WABI
2005
Springer
124views Bioinformatics» more  WABI 2005»
15 years 9 months ago
Reconstructing Metabolic Networks Using Interval Analysis
Recently, there has been growing interest in the modelling and simulation of biological systems. Such systems are often modelled in terms of coupled ordinary differential equation...
Warwick Tucker, Vincent Moulton