Sciweavers

9316 search results - page 236 / 1864
» Analysis of traceback techniques
Sort
View
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 11 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
ICMCS
2006
IEEE
132views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Clustering-Based Analysis of Semantic Concept Models for Video Shots
In this paper we present a clustering-based method for representing semantic concepts on multimodal low-level feature spaces and study the evaluation of the goodness of such model...
Markus Koskela, Alan F. Smeaton
MSWIM
2005
ACM
15 years 11 months ago
Performance analysis of differentiated ARQ scheme for video transmission over wireless networks
The Advance in video coding and wireless communication techniques has enabled video-based services to be the most important component of many emerging multimedia applications. The...
Fen Hou, Pin-Han Ho, Yongbing Zhang
ACISP
2005
Springer
15 years 11 months ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
APN
2005
Springer
15 years 11 months ago
High Level Petri Nets Analysis with Helena
This paper presents the high level Petri nets analyzer Helena. Helena can be used for the on-the-fly verification of state properties, i.e., properties that must hold in all the ...
Sami Evangelista