Sciweavers

154 search results - page 31 / 31
» Security Analysis of the MPLS Label Distribution Protocol
Sort
View
PAMI
2008
190views more  PAMI 2008»
13 years 4 months ago
Scene Classification Using a Hybrid Generative/Discriminative Approach
We investigate whether dimensionality reduction using a latent generative model is beneficial for the task of weakly supervised scene classification. In detail we are given a set ...
Anna Bosch, Andrew Zisserman, Xavier Muñoz
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
13 years 11 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
USS
2004
13 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 4 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...