Sciweavers

9316 search results - page 103 / 1864
» Analysis of traceback techniques
Sort
View
AUSDM
2007
Springer
140views Data Mining» more  AUSDM 2007»
15 years 7 months ago
The application of data mining techniques to characterize agricultural soil profiles
The advances in computing and information storage have provided vast amounts of data. The challenge has been to extract knowledge from this raw data; this has lead to new methods ...
Leisa Armstrong, Dean Diepeveen, Rowan Maddern
ICNP
2005
IEEE
15 years 7 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
CAIP
2005
Springer
194views Image Analysis» more  CAIP 2005»
15 years 7 months ago
Comparative Study of 3D Face Acquisition Techniques
Today, communication devices are evolving towards friendly–user interactivity while permanently eyeing towards 3D display technologies. As such, 3D face generation, modelling an...
Mark Chan, Patrice Delmas, Georgy L. Gimel'farb, P...
ICIAR
2004
Springer
15 years 7 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
DIMVA
2007
15 years 3 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song