Sciweavers

1737 search results - page 161 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
162
Voted
NC
1998
143views Neural Networks» more  NC 1998»
15 years 6 months ago
Spotting Arabic Phonetic Features Using Modular Connectionist Architectures and a Rule-Based System
This paper reports the results of experiments in complex Arabic phonetic features identification using a rulebased system (SARPH) and modular connectionist architectures. The firs...
Sid-Ahmed Selouani, Jean Caelen
MINENET
2006
ACM
15 years 11 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
NDSS
2000
IEEE
15 years 9 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
IPPS
1998
IEEE
15 years 9 months ago
Performance Analysis of a Fault-Tolerant Scheme for Location Management of Mobile Hosts
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
Saad Biaz, Nitin H. Vaidya
157
Voted
ICC
2007
IEEE
110views Communications» more  ICC 2007»
15 years 11 months ago
Resource Optimization to Provision a Virtual Private Network Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. With increase in number and size of VPNs, providers nee...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja