Sciweavers

2715 search results - page 302 / 543
» Network bucket testing
Sort
View
145
Voted
TSE
2010
230views more  TSE 2010»
14 years 10 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
142
Voted
TSP
2010
14 years 10 months ago
Statistical detection of congestion in routers
Detection of congestion plays a key role in numerous networking protocols, including those driving Active Queue Management (AQM) methods used in congestion control in Internet rout...
Ivan D. Barrera, Stephan Bohacek, Gonzalo R. Arce
125
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
RISA: Distributed Road Information Sharing Architecture
—With the advent of the new IEEE 802.11p DSRC/WAVE radios, Vehicle-to-Vehicle (V2V) communications is poised for a dramatic leap. A canonical application for these future vehicul...
Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishna...
151
Voted
SIES
2010
IEEE
15 years 1 months ago
A Comparison of Linux CAN Drivers and their Applications
The aim of this paper is to introduce LinCAN, a CAN driver system for Linux, developed at the Department of Control Engineering of the Czech Technical University in Prague, and to ...
Michal Sojka, Pavel Pisa, Martin Petera, Ondrej Sp...
115
Voted
ICIP
2005
IEEE
16 years 5 months ago
Artificial neural network-based segmentation and apple grading by machine vision
In this paper, a computer vision based system is introduced to automatically sort apple fruits. An artificial neural network segments the defected regions on fruit by pixel-wise p...
Devrim Unay, Bernard Gosselin