Sciweavers

883 search results - page 164 / 177
» The RETOS operating system: kernel, tools and applications
Sort
View
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 9 months ago
Spreadsheet modelling for solving combinatorial problems: The vendor selection problem
Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers...
Pandelis G. Ipsilandis
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICTAI
1997
IEEE
15 years 1 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
TSMC
2002
93views more  TSMC 2002»
14 years 9 months ago
Statistical analysis of the main parameters involved in the design of a genetic algorithm
Abstract--Most genetic algorithm (GA) users adjust the main parameters of the design of a GA (crossover and mutation probability, population size, number of generations, crossover,...
Ignacio Rojas, Jesús González, H&eac...
ESORICS
2007
Springer
15 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...