Sciweavers

6274 search results - page 1236 / 1255
» From query complexity to computational complexity
Sort
View
138
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
114
Voted
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 10 months ago
A Distributed Scheme for Responsive Network Engineering
— Optimal bandwidth utilisation together with resilience and recovery from failure are two key drivers for Traffic Engineering (TE) which have been widely addressed by the IP co...
Johannes Göbel, Anthony E. Krzesinski, Dieter...
154
Voted
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
15 years 10 months ago
Stereo-based Markerless Human Motion Capture for Humanoid Robot Systems
Abstract— In this paper, we present an image-based markerless human motion capture system, intended for humanoid robot systems. The restrictions set by this ambitious goal are nu...
Pedram Azad, Ales Ude, Tamim Asfour, Rüdiger ...
130
Voted
IROS
2007
IEEE
198views Robotics» more  IROS 2007»
15 years 10 months ago
Cooperation of heterogeneous, autonomous robots: A case study of humanoid and wheeled robots
Abstract— In this paper we present a case study of cooperation of a strongly heterogeneous robot team, composed of a highly articulated humanoid robot and a wheeled robot with la...
Jutta Kiener, Oskar von Stryk
118
Voted
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
15 years 9 months ago
Generalized Correlation Analysis of Vectorial Boolean Functions
We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean f...
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan...
« Prev « First page 1236 / 1255 Last » Next »