Sciweavers

450 search results - page 74 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
89
Voted
CORR
2006
Springer
112views Education» more  CORR 2006»
14 years 9 months ago
Outage Capacity of the Fading Relay Channel in the Low SNR Regime
In this paper we look at the outage capacity of the fading relay channel with half-duplex constraint in the low SNR regime. First we consider the scenario that the channel state i...
Amir Salman Avestimehr, David N. C. Tse
CN
2004
127views more  CN 2004»
14 years 9 months ago
Intermediary infrastructures for the World Wide Web
Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In th...
Marios D. Dikaiakos
ITP
2010
155views Mathematics» more  ITP 2010»
14 years 8 months ago
Translation in XBRL standardization
eXtensible Business Reporting Language (XBRL) presents new opportunities for integrating information flow within communities of diverse organisations thereby significantly enhanci...
Indrit Troshani, Andy Lymer
102
Voted
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 1 months ago
Gossip PCA
Eigenvectors of data matrices play an important role in many computational problems, ranging from signal processing to machine learning and control. For instance, algorithms that ...
Satish Babu Korada, Andrea Montanari, Sewoong Oh
PAM
2007
Springer
15 years 3 months ago
Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware
Abstract. Tracing traffic using commodity hardware in contemporary highspeed access or aggregation networks such as 10-Gigabit Ethernet is an increasingly common yet challenging t...
Fabian Schneider, Jörg Wallerich, Anja Feldma...