Sciweavers

7544 search results - page 77 / 1509
» Network Forensics Analysis
Sort
View
CN
2000
95views more  CN 2000»
14 years 9 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
RITA
2002
110views more  RITA 2002»
14 years 9 months ago
Modeling and Rendering of Real Environments
The use of detailed geometric models is a critical factor for achieving realism in most computer graphics applications. In the past few years, we have observed an increasing deman...
Wagner Toledo Corrêa, Manuel M. Oliveira, Cl...
BMCBI
2010
163views more  BMCBI 2010»
14 years 4 months ago
RISCI - Repeat Induced Sequence Changes Identifier: a comprehensive, comparative genomics-based, in silico subtractive hybridiza
Background -: The availability of multiple whole genome sequences has facilitated in silico identification of fixed and polymorphic transposable elements (TE). Whereas polymorphic...
Vipin Singh, Rakesh K. Mishra
COMSWARE
2007
IEEE
15 years 4 months ago
Analysis of Dynamic Sensor Networks: Power Law Then What?
— Recent studies on wireless sensor networks (WSN) have shown that the duration of contacts and inter-contacts are power law distributed. While this is a strong property of these...
Eric Fleury, Jean-Loup Guillaume, Céline Ro...
ICDE
2005
IEEE
158views Database» more  ICDE 2005»
15 years 3 months ago
An Analysis of Spatio-Temporal Query Processing in Sensor Networks
Sensor networks are an emerging technology that provide new means to monitor and understand various phenomena. Nodes in a sensor network typically have a limited power supply, thu...
Alexandru Coman, Jörg Sander, Mario A. Nascim...