Sciweavers

2187 search results - page 358 / 438
» Performance analysis of distributed embedded systems
Sort
View
145
Voted
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 10 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
155
Voted
CCS
2005
ACM
15 years 9 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
143
Voted
MMSEC
2004
ACM
205views Multimedia» more  MMSEC 2004»
15 years 9 months ago
Wavelet-based blind watermarking of 3D models
Watermarking of 3D meshes has received a limited attention due to the difficulties encountered in extending the algorithms developed for 1D (audio) and 2D (images and video) signa...
F. Uccheddu, Massimiliano Corsini, Mauro Barni
COLING
1992
15 years 4 months ago
A Freely Available Wide Coverage Morphological Analyzer for English
This paper presents a morphological lexicon for English that handle more than 317000 inflected forms derived from over 90000 stems. The lexicon is available in two formats. The fi...
Daniel Karp, Yves Schabes, Martin Zaidel, Dania Eg...
126
Voted
GRID
2007
Springer
15 years 9 months ago
On the dynamic resource availability in grids
— Currently deployed grids gather together thousands of computational and storage resources for the benefit of a large community of scientists. However, the large scale, the wid...
Alexandru Iosup, Mathieu Jan, Omer Ozan Sonmez, Di...