Sciweavers

451 search results - page 39 / 91
» A New Approach to Survivability of Connection Oriented Netwo...
Sort
View
ICANN
2005
Springer
14 years 1 months ago
A Hardware/Software Framework for Real-Time Spiking Systems
Abstract. One focus of recent research in the field of biologically plausible neural networks is the investigation of higher-level functions such as learning, development and modu...
Matthias Oster, Adrian M. Whatley, Shih-Chii Liu, ...
CORR
2006
Springer
143views Education» more  CORR 2006»
13 years 7 months ago
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can repre...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, G...
INFOCOM
2011
IEEE
12 years 11 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICPR
2002
IEEE
14 years 8 months ago
Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering
This paper introduces a new architecture for face detection in color images. Based on skin locus and successive detectors, the method allows high efficiency under drastically vary...
Abdenour Hadid, Birgitta Martinkauppi, Matti Pieti...
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 12 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...