Sciweavers

313 search results - page 55 / 63
» Error Correction Based on Verification Techniques
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
CORR
2006
Springer
103views Education» more  CORR 2006»
14 years 9 months ago
AS Relationships: Inference and Validation
Research on performance, robustness, and evolution of the global Internet is fundamentally handicapped without accurate and thorough knowledge of the nature and structure of the c...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, M...
CAD
2004
Springer
14 years 9 months ago
ESOLID - a system for exact boundary evaluation
We present a system, ESOLID, that performs exact boundary evaluation of low-degree curved solids in reasonable amounts of time. ESOLID performs accurate Boolean operations using e...
John Keyser, Tim Culver, Mark Foskey, Shankar Kris...
RIDE
1997
IEEE
15 years 1 months ago
Knowledge Discovery from Users Web-Page Navigation
We propose to detect users navigationpaths to the advantage of web-site owners. First, we explain the design and implementationof a profiler which captures client’s selected li...
Cyrus Shahabi, Amir M. Zarkesh, Jafar Adibi, Visha...
IH
1999
Springer
15 years 1 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak