Sciweavers

288 search results - page 42 / 58
» Performance anomaly of 802.11b
Sort
View
CEC
2008
IEEE
15 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
IPPS
2008
IEEE
15 years 4 months ago
Early experience with out-of-core applications on the Cray XMT
This paper describes our early experiences with a preproduction Cray XMT system that implements a scalable shared memory architecture with hardware support for multithreading. Unl...
Daniel G. Chavarría-Miranda, Andrès ...
ICITA
2005
IEEE
15 years 3 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
FPL
2005
Springer
119views Hardware» more  FPL 2005»
15 years 3 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
INFOVIS
1999
IEEE
15 years 1 months ago
Navigating Hierarchies with Structure-Based Brushes
Interactive selection is a critical component in exploratory visualization, allowing users to isolate subsets of the displayed information for highlighting, deleting, analysis, or...
Ying-Huey Fua, Matthew O. Ward, Elke A. Rundenstei...