Sciweavers

329 search results - page 40 / 66
» Observability of vortex flows
Sort
View
CONEXT
2006
ACM
15 years 1 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
ATAL
2008
Springer
15 years 5 days ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ATAL
2008
Springer
15 years 5 days ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CIC
2004
14 years 11 months ago
Audio Quality for a Simple Forward Error Correcting Code
The aim of this paper is to study the audio quality offered by a simple Forward Error Correction (FEC) code used in audio applications like Freephone or Rat. This coding technique ...
Yvan Calas, Alain Jean-Marie
BMVC
2000
14 years 11 months ago
Recognizing Objects From Curvilinear Motion
This paper introduces an object recognition strategy based on the following premises: i) an object can be identified on the basis of the optical flow it induces on a stationary ob...
Tal Arbel, Frank P. Ferrie, Marcel Mitran