Sciweavers

500 search results - page 98 / 100
» Streaming tree automata
Sort
View
LISA
2000
13 years 7 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
TNN
2008
178views more  TNN 2008»
13 years 6 months ago
IMORL: Incremental Multiple-Object Recognition and Localization
This paper proposes an incremental multiple-object recognition and localization (IMORL) method. The objective of IMORL is to adaptively learn multiple interesting objects in an ima...
Haibo He, Sheng Chen
SCN
2011
Springer
348views Communications» more  SCN 2011»
13 years 1 months ago
MANET QoS support without reservations
An inelastic flow is a flow with inelastic rate: i.e., the rate is fixed, it cannot be dynamically adjusted to traffic and load condition as in elastic flows like TCP. Real ti...
Soon-Young Oh, Gustavo Marfia, Mario Gerla
COMCOM
2007
136views more  COMCOM 2007»
13 years 6 months ago
Demand-scalable geographic multicasting in wireless sensor networks
In this paper, we focus on the challenge of demand-scalable multicast routing in wireless sensor networks. Due to the ad-hoc nature of the placement of the sensor nodes as well as...
Shibo Wu, K. Selçuk Candan
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 6 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray