Sciweavers

683 search results - page 80 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
113
Voted
SEM
2004
Springer
15 years 6 months ago
Experience with Lightweight Distributed Component Technologies in Business Intelligence Systems
Business Intelligence (BI) systems address the demands of large scale enterprises for operational analytics, management information and decision support tasks. Building such applic...
Leticia Duboc, Tony Wicks, Wolfgang Emmerich
WISEC
2009
ACM
15 years 7 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
127
Voted
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 7 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
86
Voted
NDSS
2007
IEEE
15 years 7 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
VRML
2004
ACM
15 years 6 months ago
Interactive Web-based visualisation of block model data
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
Tony Gill, Con Caris, Guy LeBlanc Smith