Sciweavers

2601 search results - page 502 / 521
» A Point in Many Triangles
Sort
View
TC
2008
13 years 7 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...
TCOM
2008
81views more  TCOM 2008»
13 years 7 months ago
On optimal computation of MPLS label binding for multipoint-to-point connections
Most network operators have considered reducing Label Switched Routers (LSR) label spaces (i.e. the number of labels that can be used) as a means of simplifying management of under...
Fernando Solano, Ramón Fabregat, José...
TIP
2008
169views more  TIP 2008»
13 years 7 months ago
Maximum Likelihood Wavelet Density Estimation With Applications to Image and Shape Matching
Density estimation for observational data plays an integral role in a broad spectrum of applications, e.g. statistical data analysis and information-theoretic image registration. ...
Adrian M. Peter, Anand Rangarajan
BMCBI
2005
61views more  BMCBI 2005»
13 years 7 months ago
Proteins with two SUMO-like domains in chromatin-associated complexes: The RENi (Rad60-Esc2-NIP45) family
Background: Post-translational modification by Small Ubiquitin-like Modifiers (SUMO) has been implicated in protein targeting, in the maintenance of genomic integrity and in trans...
Maria Novatchkova, Andreas Bachmair, Birgit Eisenh...
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 7 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...