Sciweavers

1518 search results - page 183 / 304
» Cryptographic Test Correction
Sort
View
GLOBECOM
2006
IEEE
15 years 6 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
114
Voted
ICNP
2006
IEEE
15 years 6 months ago
Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
ICRA
2005
IEEE
105views Robotics» more  ICRA 2005»
15 years 6 months ago
A New Approach to the Use of Edge Extremities for Model-based Object Tracking
— This paper presents a robust model-based visual tracking algorithm that can give accurate 3D pose of a rigid object. Our tracking algorithm uses an incremental pose update sche...
Youngrock Yoon, Akio Kosaka, Jae Byung Park, Avina...
121
Voted
ISMAR
2005
IEEE
15 years 6 months ago
Augmented Foam: A Tangible Augmented Reality for Product Design
Computer Aided Design applications have become designers’ inevitable tools for expressing and simulating innovative ideas and concepts. However, replacing traditional materials ...
Woohun Lee, Jun Park
PAM
2005
Springer
15 years 6 months ago
On the Stationarity of TCP Bulk Data Transfers
Abstract. While the Internet offers a single best-effort service, we remark that (i) core backbones are in general over provisioned, (ii) end users have increasingly faster acces...
Guillaume Urvoy-Keller