Sciweavers

1215 search results - page 126 / 243
» On modeling, analysis, and optimization of packet aggregatio...
Sort
View
IMC
2004
ACM
15 years 3 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
SIGCOMM
2010
ACM
14 years 10 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
ICIP
2010
IEEE
14 years 8 months ago
Real-time 3D reconstruction and pose estimation for human motion analysis
In this paper, we present a markerless 3D motion capture system based on a volume reconstruction technique of non rigid bodies. It depicts a new approach for pose estimation in or...
Holger Graf, Sang Min Yoon, Cornelius Malerczyk
WSC
1998
14 years 11 months ago
The Value of Simulation in Modeling Supply Chains
In business today, re-engineering has taken a great deal of the cost out of internal corporate processes. Our factories and internal support organizations have become much more ef...
Ricki G. Ingalls
JUCS
2008
104views more  JUCS 2008»
14 years 10 months ago
Optimal Transit Price Negotiation: The Distributed Learning Perspective
: We present a distributed learning algorithm for optimizing transit prices in the inter-domain routing framework. We present a combined game theoretical and distributed algorithmi...
Dominique Barth, Loubna Echabbi, Chahinez Hamlaoui