Peng

Results: 1037



#Item
391Electronics / Computing / Formal sciences / Audio engineering / Digital television / Sensor node / Lossless data compression / Discrete cosine transform / ANT / Wireless sensor network / Data compression / Technology

Authenticated Data Compression in Delay Tolerant Wireless Sensor Networks Young-Hyun Oh, Peng Ning, Yao Liu North Carolina State University Raleigh, NCEmail: {yoh4, pning, yliu20}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:09
392Mathematics / Statistical theory / Computer accessibility / Speech recognition / Principle of maximum entropy / Lattice / Abstract algebra / Statistics / Bayesian statistics

MAXIMUM ENTROPY BASED NORMALIZATION OF WORD POSTERIORS FOR PHONETIC AND LVCSR LATTICE SEARCH Peng Yu, Duo Zhang , Frank Seide Microsoft Research Asia, 5F Beijing Sigma Center, 49 Zhichun Rd., Beijing, P.R.C. roge

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-08-10 10:41:29
393Internet protocols / Internet standards / Windows Server / Secure Shell / Transmission Control Protocol / Server / Windows / Portmap / Communications protocol / Computing / System software / Internet

NSDMiner: Automated Discovery of Network Service Dependencies Arun Natarajan, Peng Ning, Yao Liu Sushil Jajodia

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-01-11 16:13:03
394Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
395Crime prevention / National security / Software testing / Integrity / Vulnerability / Database / Ring / Computer security / Security / Cyberwarfare

ABSTRACT KIL, CHONGKYUNG. Mechanisms for Protecting Software Integrity in Networked Systems. (Under the direction of Associate Professor Peng Ning). Protecting software integrity is a key to successfully maintain its own

Add to Reading List

Source URL: repository.lib.ncsu.edu

Language: English - Date: 2010-10-28 07:21:39
396Security / Cloud computing / Computer network security / Antivirus software / VM / Application firewall / Computer virus / Computer security / System software / Computing

Computer Science DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, William Enck, Peng Ning – NC State

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:21:08
397Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
398Relevance feedback / Tf*idf / Relevance / Document retrieval / Search engine indexing / Precision and recall / Language model / Text Retrieval Conference / Okapi BM25 / Information science / Information retrieval / Query expansion

University of Glasgow at TREC 2007: Experiments in Blog and Enterprise Tracks with Terrier David Hannah, Craig Macdonald, Jie Peng, Ben He, Iadh Ounis Department of Computing Science University of Glasgow Scotland, UK

Add to Reading List

Source URL: trec.nist.gov

Language: English - Date: 2008-02-06 14:13:16
399Computing / Sensor node / Location estimation in sensor networks / Estimation theory / Wireless sensor network / Telecommunications engineering / Technology

Attack-Resistant Location Estimation in Wireless Sensor Networks Donggang Liu The University of Texas at Arlington Peng Ning, An Liu North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:19
400Apple Inc. / Android / Cloud clients / IPhone / ITunes / Android Market / App Store / Rooting / IOS / Software / Smartphones / Computing

Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning North Carolina State University 890 Oval Drive, Raleigh, NC 27695 {wzhou2, yajin_zhou xuxian_j

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-07 17:23:54
UPDATE