Sciweavers

1737 search results - page 89 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
DSOM
2007
Springer
15 years 3 months ago
Bottleneck Detection Using Statistical Intervention Analysis
Abstract. The complexity of today's large-scale enterprise applications demands system administrators to monitor enormous amounts of metrics, and reconfigure their hardware as...
Simon Malkowski, Markus Hedwig, Jason Parekh, Calt...
ISPA
2007
Springer
15 years 6 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 6 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
BMCBI
2007
120views more  BMCBI 2007»
15 years 1 hour ago
Re-sampling strategy to improve the estimation of number of null hypotheses in FDR control under strong correlation structures
Background: When conducting multiple hypothesis tests, it is important to control the number of false positives, or the False Discovery Rate (FDR). However, there is a tradeoff be...
Xin Lu, David L. Perkins
COCOON
2008
Springer
15 years 1 months ago
Average-Case Competitive Analyses for One-Way Trading
Consider a trader who exchanges one dollar into yen and assume that the exchange rate fluctuates within the interval [m, M]. The game ends without advance notice, then the trader ...
Hiroshi Fujiwara, Kazuo Iwama, Yoshiyuki Sekiguchi