Sciweavers

451 search results - page 39 / 91
» A New Approach to Survivability of Connection Oriented Netwo...
Sort
View
125
Voted
ICANN
2005
Springer
15 years 6 months ago
A Hardware/Software Framework for Real-Time Spiking Systems
Abstract. One focus of recent research in the field of biologically plausible neural networks is the investigation of higher-level functions such as learning, development and modu...
Matthias Oster, Adrian M. Whatley, Shih-Chii Liu, ...
92
Voted
CORR
2006
Springer
143views Education» more  CORR 2006»
15 years 16 days ago
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can repre...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...
INFOCOM
2011
IEEE
14 years 3 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
110
Voted
ICPR
2002
IEEE
16 years 1 months ago
Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering
This paper introduces a new architecture for face detection in color images. Based on skin locus and successive detectors, the method allows high efficiency under drastically vary...
Abdenour Hadid, Birgitta Martinkauppi, Matti Pieti...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 4 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...