Sciweavers

246 search results - page 10 / 50
» Operating System Profiling via Latency Analysis
Sort
View
INFOCOM
1996
IEEE
15 years 9 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
EUROPAR
2001
Springer
15 years 9 months ago
VIA Communication Performance on a Gigabit Ethernet Cluster
As the technology for high-speed networks has evolved over the last decade, the interconnection of commodity computers (e.g., PCs and workstations) at gigabit rates has become a re...
Mark Baker, Paul A. Farrell, Hong Ong, Stephen L. ...
IEEEIAS
2009
IEEE
15 years 11 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
SAINT
2005
IEEE
15 years 10 months ago
Design and Analysis of an e-Transaction Protocol Tailored for OCC
In this work we present a protocol ensuring the eTransaction guarantee (i.e. a recently proposed end-to-end reliability guarantee) in a Web based, three-tier transactional system....
Paolo Romano, Francesco Quaglia, Bruno Ciciani
ISCAS
2005
IEEE
145views Hardware» more  ISCAS 2005»
15 years 10 months ago
SoC platform based design of MPEG-2/4 AAC audio decoder
—This paper presents a SoC platform based design for the implementation of AAC audio decoder. We present the approach not only for the characteristics of the algorithm, but also ...
Chun-Nan Liu, Tsung-Han Tsai