Sciweavers

1513 search results - page 275 / 303
» Fibonacci Correction Networks
Sort
View
ICMCS
1999
IEEE
126views Multimedia» more  ICMCS 1999»
15 years 6 months ago
Error Spreading: Reducing Bursty Errors in Continuous Media Streaming
With the growing popularity of the Internet, there is increasing interest in using it for audio and video transmission. Periodic network overloads, leading to bursty packet losses...
Hung Q. Ngo, Srivatsan Varadarajan, Jaideep Srivas...
RAID
1999
Springer
15 years 6 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
ACSAC
2004
IEEE
15 years 5 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
COCOON
2006
Springer
15 years 5 months ago
Reconstructing Evolution of Natural Languages: Complexity and Parameterized Algorithms
In a recent article, Nakhleh, Ringe and Warnow introduced perfect phylogenetic networks--a model of language evolution where languages do not evolve via clean speciation--and form...
Iyad A. Kanj, Luay Nakhleh, Ge Xia
ATMOS
2008
103views Optimization» more  ATMOS 2008»
15 years 3 months ago
IP-based Techniques for Delay Management with Priority Decisions
Delay management is an important issue in the daily operations of any railway company. The task is to update the planned timetable to a disposition timetable in such a way that the...
Michael Schachtebeck, Anita Schöbel