Sciweavers

5234 search results - page 846 / 1047
» Simulation of Computer Network Attacks
Sort
View
CCR
2006
96views more  CCR 2006»
15 years 4 months ago
XCP for shared-access multi-rate media
The eXplicit Control Protocol (XCP) was developed to overcome some of the limitations of TCP, such as low utilization in high bandwidth delay product networks, unstable throughput...
Filipe Abrantes, Manuel Ricardo
IJNSEC
2008
129views more  IJNSEC 2008»
15 years 4 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
EXPERT
2010
145views more  EXPERT 2010»
15 years 1 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
TMC
2011
187views more  TMC 2011»
14 years 11 months ago
Mobility Tracking Based on Autoregressive Models
We propose an integrated scheme for tracking the mobility of a user based on autoregressive models that accurately capture the characteristics of realistic user movements in wirel...
Zainab R. Zaidi, Brian L. Mark
ICASSP
2011
IEEE
14 years 8 months ago
Uncover cooperative gene regulations by microRNAs and transcription factors in glioblastoma using a nonnegative hybrid factor mo
—Transcriptional regulation by transcription factors (TFs) and microRNAs controls when and how much RNA is created. Due to technical limitations, the protein level expressions of...
Jia Meng, Hung-I Harry Chen, Jianqiu Zhang, Yidong...