Sciweavers

2500 search results - page 370 / 500
» Specifying Behavior in C
Sort
View
130
Voted
NDSS
2005
IEEE
15 years 9 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
SIBGRAPI
2005
IEEE
15 years 9 months ago
Particle Filter-Based Predictive Tracking for Robust Fish Counting
In this paper we study the use of computer vision techniques for for underwater visual tracking and counting of fishes in vivo. The methodology is based on the application of a B...
Erikson F. Morais, Mario Fernando Montenegro Campo...
ANCS
2005
ACM
15 years 9 months ago
Gigabit routing on a software-exposed tiled-microprocessor
This paper investigates the suitability of emerging tiled-architectures, equipped with low-latency on-chip networks, for high-performance network routing. In this paper, we presen...
Umar Saif, James W. Anderson, Anthony Degangi, Ana...
103
Voted
APGV
2005
ACM
107views Visualization» more  APGV 2005»
15 years 9 months ago
A multiresolution color model for visual difference prediction
How different are two images when viewed by a human observer? Such knowledge is needed in many situations including when one has to judge the degree to which a graphics representa...
David J. Tolhurst, Caterina Ripamonti, C. Alejandr...
127
Voted
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...