Sciweavers

7544 search results - page 228 / 1509
» Network Forensics Analysis
Sort
View
INFOCOM
1996
IEEE
15 years 9 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
189
Voted
WSC
2007
15 years 7 months ago
Stability analysis of the supply chain by using neural networks and genetic algorithms
Effectively managing a supply chain requires visibility to detect unexpected variations in the dynamics of the supply chain environment at an early stage. This paper proposes a me...
Alfonso Sarmiento, Luis Rabelo, Ramamoorthy Lakkoj...
CSREAESA
2004
15 years 6 months ago
Analytical Analysis of Data and Decision Fusion in Sensor Networks
- MEMS technology has improved such that the capabilities of large sensor devices can now be encompassed in devices that are the size of a penny. These resource constraint devices ...
Zille Huma Kamal, Mohammad Ali Salahuddin, Ajay K....
UAI
1997
15 years 6 months ago
Robustness Analysis of Bayesian Networks with Local Convex Sets of Distributions
Robust Bayesian inference is the calculation of posterior probability bounds given perturbations in a probabilistic model. This paper focuses on perturbations that can be expresse...
Fabio Gagliardi Cozman
IJAHUC
2008
118views more  IJAHUC 2008»
15 years 5 months ago
Analysis models for unguided search in unstructured P2P networks
: Random walk and flooding are basic mechanisms for searching unstructured overlays. This paper shows that node coverage is an important metric for query performance in random grap...
Bin Wu, Ajay D. Kshemkalyani