Sciweavers

5234 search results - page 793 / 1047
» Simulation of Computer Network Attacks
Sort
View
EUC
2005
Springer
15 years 10 months ago
Object Tracking Using Durative Events
This paper presents a distributed middleware architecture based on a service-oriented approach, to manage high volume sensor events. Event management takes a multi-step operation f...
Eiko Yoneki, Jean Bacon
GCC
2005
Springer
15 years 10 months ago
A Worm Behavioral Approach to Susceptible Host Detection
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter...
BaiLing Wang, Binxing Fang, Xiao-chun Yun
121
Voted
DATE
2002
IEEE
87views Hardware» more  DATE 2002»
15 years 9 months ago
Model Reduction in the Time-Domain Using Laguerre Polynomials and Krylov Methods
We present a new passive model reduction algorithm based on the Laguerre expansion of the time response of interconnect networks. We derive expressions for the Laguerre coefficie...
Yiran Chen, Venkataramanan Balakrishnan, Cheng-Kok...
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 11 months ago
Adaptive Amplify-and-Forward Cooperative Diversity using Phase Feedback
— Cooperative diversity obtains the spatial diversity gains created by sharing antennas of terminals in wireless networks. In this paper, adaptive amplify-and-forward (AF) cooper...
Dongwoo Lee, Jae Hong Lee
LCN
2006
IEEE
15 years 10 months ago
A New Stable AQM Algorithm Exploiting RTT Estimation
AQM is a technique for congestion control such that a router notifies congestion to a TCP sender when congestion occurs. Almost no AQM algorithms ever take the RTT values of TCP ...
Hayato Hoshihara, Hisashi Koga, Toshinori Watanabe