Sciweavers

741 search results - page 111 / 149
» Tools and techniques for Network Forensics
Sort
View
CMG
2003
15 years 16 days ago
{Performance Modeling and Evaluation of Large-Scale J2EE Applications
The queueing Petri net (QPN) paradigm provides a number of benefits over conventional modeling paradigms such as queueing networks and generalized stochastic Petri nets. Using qu...
Samuel Kounev, Alejandro P. Buchmann
KES
2007
Springer
14 years 11 months ago
An Application of Machine Learning Methods to PM10 Level Medium-Term Prediction
The study described in this paper, analyzed the urban and suburban air pollution principal causes and identified the best subset of features (meteorological data and air pollutants...
Giovanni Raimondo, Alfonso Montuori, Walter Moniac...
106
Voted
ICASSP
2011
IEEE
14 years 2 months ago
Rate control for PSD limited multiple access systems through linear programming
In this paper we discuss rate control for multiuser multicarrier systems, where the transmitter has a single antenna and is subject to a PSD mask limitation while the receiver has...
Amir Leshem, Ephraim Zehavi
IMC
2009
ACM
15 years 5 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
CSFW
2007
IEEE
15 years 5 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...