Sciweavers

7544 search results - page 204 / 1509
» Network Forensics Analysis
Sort
View
122
Voted
ICES
2010
Springer
128views Hardware» more  ICES 2010»
15 years 1 months ago
Evolution and Analysis of a Robot Controller Based on a Gene Regulatory Network
Abstract. This paper explores the application of an artificial developmental system (ADS) to the field of evolutionary robotics by investigating the capability of a gene regulatory...
Martin Trefzer, Tüze Kuyucu, Julian F. Miller...
ISCC
2009
IEEE
198views Communications» more  ISCC 2009»
15 years 10 months ago
An analysis of the heterogeneity and IP packet reordering over multiple wireless networks
Abstract—With the increasing deployment of wireless technologies, such as WLAN, HSDPA, and WiMAX, it is often the case that simultaneous coverage of several access networks is av...
Dominik Kaspar, Kristian Evensen, Audun Fosselie H...
CORR
2008
Springer
137views Education» more  CORR 2008»
15 years 3 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
200
Voted
ISBI
2011
IEEE
14 years 7 months ago
Extraction and analysis of actin networks based on Open Active Contour models
Network structures formed by actin filaments are present in many kinds of fluorescence microscopy images. In order to quantify the conformations and dynamics of such actin fila...
Ting Xu, Hongsheng Li, Tian Shen, Nikola Ojkic, Di...
PACT
2001
Springer
15 years 8 months ago
Static Analysis for Secrecy and Non-interference in Networks of Processes
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an oper...
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, ...