Sciweavers

246 search results - page 10 / 50
» Operating System Profiling via Latency Analysis
Sort
View
86
Voted
INFOCOM
1996
IEEE
15 years 3 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
EUROPAR
2001
Springer
15 years 4 months ago
VIA Communication Performance on a Gigabit Ethernet Cluster
As the technology for high-speed networks has evolved over the last decade, the interconnection of commodity computers (e.g., PCs and workstations) at gigabit rates has become a re...
Mark Baker, Paul A. Farrell, Hong Ong, Stephen L. ...
IEEEIAS
2009
IEEE
15 years 6 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
SAINT
2005
IEEE
15 years 5 months ago
Design and Analysis of an e-Transaction Protocol Tailored for OCC
In this work we present a protocol ensuring the eTransaction guarantee (i.e. a recently proposed end-to-end reliability guarantee) in a Web based, three-tier transactional system....
Paolo Romano, Francesco Quaglia, Bruno Ciciani
ISCAS
2005
IEEE
145views Hardware» more  ISCAS 2005»
15 years 5 months ago
SoC platform based design of MPEG-2/4 AAC audio decoder
—This paper presents a SoC platform based design for the implementation of AAC audio decoder. We present the approach not only for the characteristics of the algorithm, but also ...
Chun-Nan Liu, Tsung-Han Tsai