Sciweavers

203 search results - page 20 / 41
» The Good, the Bad, and the Ugly
Sort
View
INFOCOM
2003
IEEE
15 years 6 months ago
Improved BGP Convergence via Ghost Flushing
— In [1], [2] it was noticed that sometimes it takes BGP a substantial amount of time and messages to converge and stabilize following the failure of some node in the Internet. I...
Anat Bremler-Barr, Yehuda Afek, Shemer Schwarz
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 6 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
PCM
2001
Springer
110views Multimedia» more  PCM 2001»
15 years 5 months ago
A Synchronous Fragile Watermarking Scheme for Erroneous Q-DCT Coefficients Detection
In video communications over error introducing channels, error concealment techniques are widely applied in video decoder for good subjective images output. However, a damaged MB ...
Minghua Chen, Yun He
GECCO
1999
Springer
167views Optimization» more  GECCO 1999»
15 years 5 months ago
A Biologically Inspired Fitness Function for Robotic Grasping
This paper describes the innovative use of genetic programming (GP) to solve the grasp synthesis problem for multifingered robot hands. The goal of our algorithm is to select a Ò...
J. Jaime Fernandez, Ian D. Walker
CEAS
2006
Springer
15 years 5 months ago
Sender Reputation in a Large Webmail Service
In this paper, we describe how a large webmail service uses reputation to classify authenticated sending domains as either spammy or not spammy. Both SPF and DomainKey authenticat...
Bradley Taylor