Sciweavers

642 search results - page 94 / 129
» Detecting Spoofed Packets
Sort
View
ICN
2007
Springer
15 years 10 months ago
ABW - Short-Timescale Passive Bandwidth Monitoring
ct Bandwidth usage monitoring is important for network troubleshooting and planning. Traditionally, used bandwidth is computed from router interface byte counters read by SNMP. Thi...
Sven Ubik, Demetres Antoniades, Arne Øsleb&...
160
Voted
PARELEC
2006
IEEE
15 years 10 months ago
Marching Pixels - Using Organic Computing Principles in Embedded Parallel Hardware
We present an organic computing approach for very fast image processing, which we call Marching Pixels (MPs). Using an embedded massively-parallel array of processor elements (PEs...
Marcus Komann, Dietmar Fey
VTC
2006
IEEE
124views Communications» more  VTC 2006»
15 years 10 months ago
Iterative Partial-Cancelling MMSE Algorithms for W-CDMA MIMO-BLAST Systems
—This paper focuses on the usage of an enhanced equalization-based receiver for WCDMA (Wideband CodeDivision Multiple Access) MIMO (Multiple Input, Multiple Output) BLAST (Bell L...
João Carlos Silva, Rui Dinis, Nuno Souto, F...
141
Voted
DCC
2005
IEEE
15 years 10 months ago
JPEG2000 and Motion JPEG2000 Content Analysis Using Codestream Length Information
The widespread adoption of the JPEG2000 standard calls for the development of computationally efficient algorithms to analyze the content of imagery compressed using this standard...
Ali Tabesh, Ali Bilgin, Karthik Krishnan, Michael ...
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 10 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...