Sciweavers

205 search results - page 34 / 41
» Performance Analysis of MPI Collective Operations
Sort
View
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
INFOCOM
2009
IEEE
15 years 4 months ago
On Passive One-Way Loss Measurements Using Sampled Flow Statistics
—The ability to scalably measure one-way packet loss across different network paths is vital to IP network management. However, the effectiveness of active-measurement techniques...
Yu Gu, Lee Breslau, Nick G. Duffield, Subhabrata S...
ITNG
2008
IEEE
15 years 4 months ago
An Efficient Technique for Distance Computation in Road Networks
With recent advances in wireless communication and position technologies, it became possible to collect and record trajectories of moving objects. Thus, many services in road netw...
Xu Jianqiu, Victor Teixeira de Almeida, Qin Xiaoli...
IJSNET
2007
97views more  IJSNET 2007»
14 years 9 months ago
Stochastic binary sensor networks for noisy environments
— This paper proposes a stochastic framework for detecting anomalies or gathering interesting events in a noisy environment using a sensor network consisting of binary sensors. A...
T. Nguyen, Dong Nguyen, Huaping Liu, Duc A. Tran
TITB
2008
117views more  TITB 2008»
14 years 9 months ago
Image-Based Gating of Intravascular Ultrasound Pullback Sequences
Intravascularultrasound (IVUS) sequences recorded in vivo are subject to a wide array of motion artifacts as the majority of these studies are performed within the coronary arterie...
Sean M. O'Malley, J. F. Granada, Stephane G. Carli...