Sciweavers

20197 search results - page 3774 / 4040
» Comparing Computational Power
Sort
View
NDSS
2008
IEEE
15 years 7 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
TRIDENTCOM
2008
IEEE
15 years 7 months ago
Performance of P2P live video streaming systems on a controlled test-bed
We evaluate and compare the performance of three P2P streaming systems that are capable of streaming live video on the Internet by testing them on a carefully controlled, traffic...
Sachin Agarwal, Jatinder Pal Singh, Aditya Mavlank...
ACIVS
2008
Springer
15 years 7 months ago
Crowd Behavior Recognition for Video Surveillance
Abstract. Crowd behavior recognition is becoming an important research topic in video surveillance for public places. In this paper, we first discuss the crowd feature selection a...
Shobhit Saxena, François Brémond, Mo...
BROADNETS
2007
IEEE
15 years 7 months ago
Dedicated path protection for waveband switching in WDM networks (invited paper)
— This paper considers the problem of dedicated path-protection in a wavelength-division multiplexing (WDM) mesh network with waveband switching (WBS) functionality under shared ...
Mengke Li, Byrav Ramamurthy
BROADNETS
2007
IEEE
15 years 7 months ago
Scheduling routing table calculations to achieve fast convergence in OSPF protocol
Fast convergence to topology changes is a key requirement in modern routing infrastructure while reducing the protocol CPU overhead continues to be as important as before. In this...
Mukul Goyal, Weigao Xie, Mohd Soperi, Seyed H. Hos...
« Prev « First page 3774 / 4040 Last » Next »