Reeves

Results: 693



#Item
151Cytogenetics / Genetics / Heparin / Lymph node / Medicine / Biopsy / Biology

EXHIBIT A Test Information Contact Betty Reeves to discuss TXCH Core Laboratory Clinical Service Agreements and pricingor

Add to Reading List

Source URL: txch.org

Language: English - Date: 2014-12-17 16:45:49
152Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
153Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
154Nat Reeves / Jackie McLean / René McLean / Ornette Coleman / Grachan Moncur III / Charles Mingus / Steve Coleman / Musical improvisation / Clarice McLean / Jazz / Music / University of Hartford

Microsoft WordPB.doc

Add to Reading List

Source URL: slehman.s3.amazonaws.com

Language: English - Date: 2013-09-06 20:53:23
155Digital audio / Watermark / Transmission Control Protocol / Latency / Network packet / Information / Paper / Printing / Watermarking / Digital watermarking / Audio watermark detection

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques∗ Pai Peng Peng Ning Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
156Network performance / Transmission Control Protocol / Greedy algorithm / Audio watermark detection / Packet loss / Communications protocol / Data / Information / Computing

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets∗ Pai Peng, Peng Ning, Douglas S. Reeves Xinyuan Wang Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
157Brad Childress / Green Bay Packers / Donovan McNabb / Bill Parcells / Dan Reeves / Mike Shanahan / Joe Gibbs / Tom Coughlin / Philadelphia Eagles / National Football League / Andy Reid / Mike Holmgren

ANDY REID HEAD COACH • 23rd NFL Season • 2nd with Chiefs

Add to Reading List

Source URL: media.kcchiefs.com

Language: English - Date: 2014-06-30 11:44:28
158Electromagnetism / Industrial automation / SCADA / Smart grid / Remote Terminal Unit / Recloser / Electric power system / Tamper resistance / Technology / Telemetry / Electric power

Tamper Event Detection on Distributed Devices in Critical Infrastructure Jason Reeves, Sean Smith Dartmouth College {reeves, sws}@cs.dartmouth.edu Abstract Utilities are currently installing a number of resource-constrai

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2015-01-12 18:09:56
159Network performance / Digital photography / Digital watermarking / Network architecture / Audio watermark detection / Traffic flow / Watermark / Jitter / Transmission Control Protocol / Watermarking / Computing / Electronics

Tracing Traffic through Intermediate Hosts that Repacketize Flows Young June Pyun∗ , Young Hee Park∗ , Xinyuan Wang† , Douglas S. Reeves∗ and Peng Ning∗ ∗ Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:09
160Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
UPDATE