Sciweavers

854 search results - page 122 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
JSAC
2006
128views more  JSAC 2006»
14 years 11 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
CERA
2010
105views more  CERA 2010»
14 years 11 months ago
Implications of Alternative Multilevel Design Methods for Design Process Management
Multilevel design problems are typically decomposed into a hierarchy of distributed and strongly coupled sub-problems, each solved by design teams with specialized knowledge and t...
David Shahan, Carolyn Seepersad Seepersad
JUCS
2000
120views more  JUCS 2000»
14 years 10 months ago
Execution and Cache Performance of the Scheduled Dataflow Architecture
: This paper presents an evaluation of our Scheduled Dataflow (SDF) Processor. Recent focus in the field of new processor architectures is mainly on VLIW (e.g. IA-64), superscalar ...
Krishna M. Kavi, Joseph Arul, Roberto Giorgi
INFOCOM
2009
IEEE
15 years 5 months ago
Blind Detection of Spread Spectrum Flow Watermarks
— Recently, the direct sequence spread-spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous pseudo-noise (PN) codes...
Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Don...
ICNP
1999
IEEE
15 years 3 months ago
Fluid Analysis of Delay Performance for QoS Support in Wireless Networks
Providing quality of service (QoS) guarantees over wireless links requires thorough understanding and quantification of the interactions among the traffic source, the wireless cha...
Jeong Geun Kim, Marwan Krunz