Sciweavers

3735 search results - page 625 / 747
» Order compression schemes
Sort
View
ISCC
2002
IEEE
15 years 5 months ago
A new approach to construct multicast trees in MPLS networks
In this paper1 , we present a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to...
Ali Boudani, Bernard Cousin
SAC
2009
ACM
15 years 5 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
SMA
2009
ACM
141views Solid Modeling» more  SMA 2009»
15 years 5 months ago
Robust principal curvatures using feature adapted integral invariants
Principal curvatures and principal directions are fundamental local geometric properties. They are well defined on smooth surfaces. However, due to the nature as higher order diļ...
Yu-Kun Lai, Shi-Min Hu, Tong Fang
ASIACRYPT
2009
Springer
15 years 5 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
GECCO
2009
Springer
175views Optimization» more  GECCO 2009»
15 years 5 months ago
Evolving soft robotic locomotion in PhysX
Given the complexity of the problem, genetic algorithms are one of the more promising methods of discovering control schemes for soft robotics. Since physically embodied evolution...
John Rieffel, Frank Saunders, Shilpa Nadimpalli, H...