Sciweavers

6240 search results - page 1063 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
CIT
2004
Springer
15 years 7 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
127
Voted
CCS
2011
ACM
14 years 1 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
CEAS
2011
Springer
14 years 1 months ago
Spam detection using web page content: a new battleground
Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from...
Marco Túlio Ribeiro, Pedro Henrique Calais ...
ICIP
2009
IEEE
16 years 3 months ago
Depth Map Enhanced Macroblock Partitioning For H.264 Video Coding Of Computer Graphics Content
In this paper, we present a method to speed up video encoding of GPU rendered scenes. Modern video codecs, like H.264/AVC, are based on motion compensation and support partitionin...
CAEPIA
2007
Springer
15 years 8 months ago
Heuristics for Planning with Action Costs
We introduce a non-admissible heuristic for planning with action costs, called the set-additive heuristic, that combines the benefits of the additive heuristic used in the HSP pla...
Emil Keyder, Hector Geffner
« Prev « First page 1063 / 1248 Last » Next »