Computer Science

College of Engineering

Works Published in 2009

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 161 - 169 of 169 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 journal article

Measuring Capacity Bandwidth of Targeted Path Segments

IEEE-ACM TRANSACTIONS ON NETWORKING, 17(1), 80–92.

By: K. Harfoush, A. Bestavros* & J. Byers*

author keywords: Bottleneck bandwidth; content distribution; end-to-end measurement; overlay networks; packet-pair
Source: Web Of Science
Added: August 6, 2018

2009 article

Denial of service attacks and defenses in decentralized trust management

Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101.

By: J. Li*, N. Li*, X. Wang & T. Yu

author keywords: Trust management; Denial of service; Access control; Trust negotiation; Game theory
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Burst lost probabilities in a queuing network with simultaneous resource possession: a single-node decomposition approach

IET Communications, 3(3), 441–453.

By: L. Battestilli*, H. Perros & S. Chukova*

Sources: Web Of Science, Crossref, ORCID
Added: August 6, 2018

2009 journal article

Particle Swarm Optimization for Sorted Adapted Gaussian Mixture Models

IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 17(2), 344–353.

author keywords: Gaussian mixture model-universal background model (GMM-UBM); particle swarm optimization (PSO); sorted GMM; speed-up; text-independent speaker verification
Source: Web Of Science
Added: August 6, 2018

2009 journal article

On automated prepared statement generation to remove SQL injection vulnerabilities

INFORMATION AND SOFTWARE TECHNOLOGY, 51(3), 589–598.

By: S. Thomas n, L. Williams & T. Xie

author keywords: SQL injection; Prepared statement; Fix automation
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation

NUCLEIC ACIDS RESEARCH, 37(2), 591–601.

Source: Web Of Science
Added: August 6, 2018

2009 journal article

Evaluation of call blocking probabilities in LEO satellite networks

INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 27(2), 103–115.

By: D. Yiltas & A. Zaim*

author keywords: call blocking probability; low Earth orbit; satellite network; traffic
Source: Web Of Science
Added: August 6, 2018

2009 journal article

The deep evolution of metazoan microRNAs

EVOLUTION & DEVELOPMENT, 11(1), 50–68.

By: B. Wheeler, A. Heimberg*, V. Moy*, E. Sperling*, T. Holstein*, S. Heber, K. Peterson*

Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

A distributed requirements management framework for legal compliance and accountability

COMPUTERS & SECURITY, 28(1-2), 8–17.

By: T. Breaux, A. Anton n & E. Spafford*

author keywords: Requirements engineering; Compliance; Accountability; Policy regulation
Source: Web Of Science
Added: August 6, 2018