Sciweavers

1512 search results - page 67 / 303
» connection 2006
Sort
View
JMLR
2006
113views more  JMLR 2006»
14 years 9 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
JCT
2006
51views more  JCT 2006»
14 years 9 months ago
Left cells containing a fully commutative element
Let W be a finite or an affine Coxeter group and Wc the set of all the fully commutative elements in W. For any left cell L of W containing some fully commutative element, our main...
Jian-Yi Shi
JSAC
2006
93views more  JSAC 2006»
14 years 9 months ago
Performance Enhancement of On-Board Communication Networks Using Outage Prediction
Abstract--A research area that has become increasingly important in recent years is that of on-board mobile communication, where users on a vehicle are connected to a local network...
Adeel Baig, Lavy Libman, Mahbub Hassan
MONET
2007
126views more  MONET 2007»
14 years 9 months ago
Performance Evaluation of a Power Management Scheme for Disruption Tolerant Network
Disruption Tolerant Network (DTN) is characterized by frequent partitions and intermittent connectivity. Power management issue in such networks is challenging. Existing power man...
Yong Xi, Mooi Choo Chuah, K. Chang
COMBINATORICS
2002
113views more  COMBINATORICS 2002»
14 years 9 months ago
Longest Increasing Subsequences in Pattern-Restricted Permutations
Inspired by the results of Baik, Deift and Johansson on the limiting distribution of the lengths of the longest increasing subsequences in random permutations, we find those limit...
Emeric Deutsch, A. J. Hildebrand, Herbert S. Wilf