Sciweavers

2500 search results - page 471 / 500
» Specifying Behavior in C
Sort
View
SIGCOMM
2006
ACM
15 years 5 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
ANSS
2005
IEEE
15 years 5 months ago
J-Sim: A Simulation Environment for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation framew...
Ahmed Sobeih, Wei-Peng Chen, Jennifer C. Hou, Lu-C...
CCGRID
2005
IEEE
15 years 5 months ago
Performance evaluation of JXTA communication layers
— The arrival of the P2P model has opened many new avenues for research within the field of distributed computing. This is mainly due to important practical features (such as su...
Gabriel Antoniu, Philip J. Hatcher, Mathieu Jan, D...
RSP
2005
IEEE
131views Control Systems» more  RSP 2005»
15 years 5 months ago
Models for Embedded Application Mapping onto NoCs: Timing Analysis
Networks-on-chip (NoCs) are an emergent communication infrastructure, which can be designed to deal with growing system complexity and technology evolution. The efficient use of N...
César A. M. Marcon, Márcio Eduardo K...
IMC
2005
ACM
15 years 5 months ago
Understanding Congestion in IEEE 802.11b Wireless Networks
The growing popularity of wireless networks has led to cases of heavy utilization and congestion. In heavily utilized wireless networks, the wireless portion of the network is a m...
Amit P. Jardosh, Krishna N. Ramachandran, Kevin C....