This paper describes a new technique for measuring Web client request patterns and analyzes a large client trace collected using the new method. In this approach a modified proxy ...
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
In order to handle complex face image variations in face recognition, multi-image face recognition has been proposed, instead of using a single still-imagebased approach. In many ...
Copyright 2005 IEEE. Published in the 2005 International Conference on Image Processing (ICIP-2005), September 11-14, 2005, Genoa, Italy. Personal use of this material is permitte...
H. Harlyn Baker, Michael Harville, Nina Bhatti, Sa...
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...