Sciweavers

42388 search results - page 8126 / 8478
» Classification Using Information
Sort
View
CCS
2008
ACM
15 years 6 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
AICT
2006
IEEE
225views Communications» more  AICT 2006»
15 years 6 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
BTW
2005
Springer
90views Database» more  BTW 2005»
15 years 6 months ago
The Importance of Being Earnest about Definitions
: Ideas from terminology management, the science of terms and definitions, can be used to improve the quality of software and data models, as well as to facilitate the achievement ...
Susan Thomas
DICS
2006
15 years 6 months ago
Dependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. 1 OVERVIEW ...
Bertrand Meyer
ECCV
2006
Springer
15 years 6 months ago
Spatial Intensity Correction of Fluorescent Confocal Laser Scanning Microscope Images
Abstract. This paper addresses the problem of intensity correction of fluorescent confocal laser scanning microscope (CLSM) images. CLSM images are frequently used in medical domai...
Sang-Chul Lee, Peter Bajcsy
« Prev « First page 8126 / 8478 Last » Next »