Sciweavers

260 search results - page 52 / 52
» Blocked Clause Elimination
Sort
View
USS
2010
13 years 2 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
FAST
2009
13 years 2 months ago
HYDRAstor: A Scalable Secondary Storage
HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distr...
Cezary Dubnicki, Leszek Gryz, Lukasz Heldt, Michal...
CORR
2011
Springer
243views Education» more  CORR 2011»
12 years 12 months ago
Deterministic Network Model Revisited: An Algebraic Network Coding Approach
Abstract—The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to appr...
MinJi Kim, Elona Erez, Edmund M. Yeh, Muriel M&eac...
TCSV
2010
12 years 11 months ago
New Fourier-Statistical Features in RGB Space for Video Text Detection
In this paper, we propose new Fourier-Statistical Features (FSF) in RGB space for detecting text in video frames of unconstrained background, different fonts, different scripts and...
Palaiahnakote Shivakumara, Trung Quy Phan, Chew Li...
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 8 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou