Sciweavers

1422 search results - page 241 / 285
» Design, Implementation and Performance Evaluation of IP-VPN
Sort
View
ICCCN
2008
IEEE
15 years 5 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...
95
Voted
ACIVS
2008
Springer
15 years 5 months ago
Video-Based Fall Detection in the Home Using Principal Component Analysis
This paper presents the design and real-time implementation of a fall-detection system, aiming at detecting fall incidents in unobserved home situations. The setup employs two fix...
Lykele Hazelhoff, Jungong Han, Peter H. N. de With
ICC
2007
IEEE
15 years 5 months ago
Utility Maximization for OFDMA Systems Over Discrete Sets
— The main task in OFDM downlink scheduling design is to maximize some kind of utility considering user specific as well as system induced constraints. A typical example is the ...
Chan Zhou, Gerhard Wunder, Thomas Michel
CISSE
2007
Springer
15 years 5 months ago
Intuitive Interface for the Exploration of Volumetric Datasets
Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a crosssectional plane thr...
Rahul Sarkar, Chrishnika de Almeida, Noureen Syed,...
MCAM
2007
Springer
125views Multimedia» more  MCAM 2007»
15 years 5 months ago
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet
In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via internet has become a promising...
Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, ...