Sciweavers

7544 search results - page 216 / 1509
» Network Forensics Analysis
Sort
View
CN
2000
71views more  CN 2000»
15 years 3 months ago
A reservation protocol for broadcast WDM networks and stability analysis
We consider the problem of coordinating access to the various channels of a single-hop wavelength division multiplexing (WDM) network. We present a high performance reservation (H...
Vijay Sivaraman, George N. Rouskas
JCNS
2000
165views more  JCNS 2000»
15 years 3 months ago
A Population Density Approach That Facilitates Large-Scale Modeling of Neural Networks: Analysis and an Application to Orientati
We explore a computationally efficient method of simulating realistic networks of neurons introduced by Knight, Manin, and Sirovich (1996) in which integrate-and-fire neurons are ...
Duane Q. Nykamp, Daniel Tranchina
115
Voted
IPL
2002
80views more  IPL 2002»
15 years 3 months ago
A note on models for non-probabilistic analysis of packet switching networks
We consider two models commonly used in the literature to model adversarial injection of packets into a packet switching network. We establish the relation between these two types...
Adi Rosén
USS
2010
15 years 1 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 10 months ago
BER Analysis of 802.11b Networks Under Mobility
—Most of the current 802.11b research activities are conducted under stationary environment. As the need for highspeed connectivity in mobile environments increases, it becomes n...
Puttipong Mahasukhon, Michael Hempel, Hamid Sharif...