Sciweavers

247 search results - page 21 / 50
» Ideals without CCC
Sort
View
84
Voted
CCS
2007
ACM
15 years 6 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
123
Voted
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Streaming of Scalable Video from Multiple Servers using Rateless Codes
This paper presents a framework for efficiently streaming scalable video from multiple servers over heterogeneous network paths. We propose to use rateless codes, or Fountain cod...
Jean-Paul Wagner, Jacob Chakareski, Pascal Frossar...
98
Voted
GLVLSI
2005
IEEE
132views VLSI» more  GLVLSI 2005»
15 years 6 months ago
FPGA implementation of a modular and pipelined WF scheduler for high speed OC192 networks
In this paper we propose an FPGA implementation of a multi protocol Weighted Fair (WF) queuing algorithm able to handle variable length packets targeted for Packet Over Sonet (POS...
Abdallah Merhebi, Otmane Aït Mohamed
103
Voted
ICCV
2005
IEEE
15 years 6 months ago
An Integrated Framework for Image Segmentation and Perceptual Grouping
This paper presents an efficient algorithm for image segmentation and a framework for perceptual grouping. It makes an attempt to provide one way of combining bottomup and top-do...
Zhuowen Tu
ICRA
2005
IEEE
113views Robotics» more  ICRA 2005»
15 years 6 months ago
Symmetric Walking Control: Invariance and Global Stability
— This paper first presents a novel control strategy for periodic motion control based on a Hamiltonian system. According to the strategy, hybrid symmetric orbits (ideal walking...
Sang-Ho Hyon, Takashi Emura