Sciweavers

5695 search results - page 943 / 1139
» Using Many Cameras as One
Sort
View
DISCEX
2003
IEEE
15 years 10 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
130
Voted
IMC
2003
ACM
15 years 10 months ago
On the correspondency between TCP acknowledgment packet and data packet
At the TCP sender side, the arrival of an ack packet always triggers the sender to send data packets, which establishes a correspondency between the arrived ack packet and the sen...
Guohan Lu, Xing Li
151
Voted
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ESOP
2003
Springer
15 years 10 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
HIPC
2003
Springer
15 years 10 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...