Sciweavers

450 search results - page 55 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
MASCOTS
2004
14 years 11 months ago
Engineering Mobile Wireless Publish/Subscribe Systems for High Performance
Decoupling flexible, scalable and asynchronous nature of publish/subscribe systems makes them a good choice for the mobile wireless domain. Our research investigates the applicati...
Umar Farooq, Shikharesh Majumdar, Eric W. Parsons
ICANN
2010
Springer
14 years 11 months ago
Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems an...
Frank Sehnke, Christian Osendorfer, Jan Sölte...
BMCBI
2010
109views more  BMCBI 2010»
14 years 10 months ago
Functional characterization and topological modularity of molecular interaction networks
Background: Analyzing interaction networks for functional characterization poses significant challenges arising from the noisy, incomplete, and generic nature of both the interact...
Jayesh Pandey, Mehmet Koyutürk, Ananth Grama
RTSS
2009
IEEE
15 years 4 months ago
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
—Emerging applications of wireless sensor networks (WSNs) require real-time quality of service (QoS) guarantees to be provided by the network. However, designing real-time schedu...
Yunbo Wang, Mehmet C. Vuran, Steve Goddard
ICMCS
2000
IEEE
89views Multimedia» more  ICMCS 2000»
15 years 2 months ago
Reducing Bandwidth Requirement for Delivering Video over Wide Area Networks with Proxy Server
Abstract—Due to the high bandwidth requirement and rate variability of compressed video, delivering video across wide area networks (WANs) is a challenging issue. Proxy servers h...
Wei-hsiu Ma, David Hung-Chang Du