We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Using these performance metrics, we consider the ability of different res
There are many good approaches for testing memory. However, many tests simply throw some patterns at memory without much thought or knowledge of memory architecture or how errors can best be detected. This works fine for hard memory failures but doe
Human Visual System-Based Image Enhancement and Logarithmic Contrast Measure Karen A. Panetta, Fellow, IEEE, Eric J. Wharton, Student Member, IEEE, and Sos S. Agaian, Senior Member, IEEE Abstract—Varying scene illumination poses many challen
We propose a routing strategy to improve the transportation efficiency on complex networks. Instead of using the routing strategy for shortest path, we give a generalized routing algorithm to find the so-called efficient path, which considers the po
The group sampling method is applied to power system reliability evaluation for the first time and combined with self-adapting important sampling algorithm, one new method is presented which has broad applicability due to need of a spot of system in
To address copyright protection and content, authentication, researchers have proposed various digital watermarking methods.In this paper, an improved, multipurpose method is proposed where the authentication watermark and the robust watermark are e
As an effective method on copyright protection of digital media , Watermarking technology referrs to many subjects ,thus needing a strong research tool. MATLAB has a lot of advantages itself, and is qualifi ed for watermarking research.. This paper
/************************************************************************* * This is an implementation of MOPSO-CD,a multiobjective particle swarm * * optimization algorithm using crowding distance * * * * For details please see: * * C.R. Raquel and
The DM9000 is a fully integrated and cost-effective single chip Fast Ethernet MAC controller with a general processor interface, a 10/100M PHY and 4K Dword SRAM. It is designed with low power and high performance process that support 3.3V with 5V to
These Schottky-clamped circuits are designed to be used in high-performance memory-decoding or data-routing applications, requiring very short propagation delay times. In high-performance memory systems these decoders can be used to minimize the eff
CAN Specification 2.0 The Controller Area Network (CAN) is a serial communications protocol which efficiently supports distributed realtime control with a very high level of security. Its domain of application ranges from high speed networks to low
The Max visual programming environment is a very effective way to work with digital media, in applications from prototype to finished product. Max was created in the mid 1980’s, and its flexible message-passing architecture has enabled it to evolve
THE FOUR STEPSof Effective Energy Management Donald R. Wulfinghoff, P.E. Wulfinghoff Energy Services, Inc. Wheaton, Maryland USA 301 – 946 – 1196 DW@EnergyBooks.com www.EnergyBooks.com "Note that, … the steps of effective energy management are th
Abstract The divided-layer protocol architecture for Mobile ad hoc Networks(simply MANETs)can only provide partial stack. This leads to treat difficulties in QoS guarantee of multimedia information transmission in MANETs, this paper proposes Across-