Sciweavers

7544 search results - page 236 / 1509
» Network Forensics Analysis
Sort
View
DCOSS
2005
Springer
15 years 11 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
NOSSDAV
2005
Springer
15 years 11 months ago
Game traffic analysis: an MMORPG perspective
Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-L...
PET
2005
Springer
15 years 11 months ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov
141
Voted
PE
2007
Springer
112views Optimization» more  PE 2007»
15 years 4 months ago
Design and analysis of adaptive strategies for locating internet-based servers in MANETs
A critical problem in providing Internet access to Mobile Ad Hoc Networks (MANETs) is how the mobile hosts can locate Internet-based servers efficiently in a dynamic, unstructure...
Hongbo Jiang, Shudong Jin
ICSE
2009
IEEE-ACM
16 years 6 months ago
Predicting build failures using social network analysis on developer communication
Adrian Schröter, Daniela Damian, Thanh H. D. ...