Sciweavers

1520 search results - page 167 / 304
» The Ring Loading Problem
Sort
View
DSOM
2009
Springer
15 years 9 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
TPCTC
2009
Springer
101views Hardware» more  TPCTC 2009»
15 years 9 months ago
Benchmarking ETL Workflows
Extraction–Transform–Load (ETL) processes comprise complex data workflows, which are responsible for the maintenance of a Data Warehouse. A plethora of ETL tools is currently a...
Alkis Simitsis, Panos Vassiliadis, Umeshwar Dayal,...
100
Voted
ICPADS
2008
IEEE
15 years 9 months ago
Bootstrapping in Peer-to-Peer Systems
Peer-to-Peer systems have become a substantial element in computer networking. Distributing the load and splitting complex tasks are only some reasons why many developers have com...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...
ISCAS
2008
IEEE
122views Hardware» more  ISCAS 2008»
15 years 9 months ago
A nano-CMOS process variation induced read failure tolerant SRAM cell
— In a nanoscale technology, memory bits are highly susceptible to process variation induced read/write failures. To address the above problem, in this paper a new memory cell is...
Jawar Singh, Jimson Mathew, Saraju P. Mohanty, Dhi...
116
Voted
ICC
2007
IEEE
15 years 9 months ago
Linear Precoding for Multiuser MIMO-OFDM Systems
— This paper develops linear precoding schemes for the downlink in multiuser multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) systems with ...
Hassen Karaa, Raviraj S. Adve, Adam J. Tenenbaum