Sciweavers

9316 search results - page 9 / 1864
» Analysis of traceback techniques
Sort
View
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
13 years 4 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
ICNP
2005
IEEE
14 years 28 days ago
Intersection Characteristics of End-to-End Internet Paths and Trees
This paper focuses on understanding the scale and the distribution of “state overhead” (briefly load) that is incurred on the routers by various value-added network services,...
Sevcan Bilir, Kamil Saraç, Turgay Korkmaz
ICC
2009
IEEE
113views Communications» more  ICC 2009»
13 years 5 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
ICDAR
2009
IEEE
13 years 5 months ago
A Methodology for Document Image Dewarping Techniques Performance Evaluation
One of the major challenges in camera document analysis is to deal with the page curl and perspective distortions. In spite of the prevalence of dewarping techniques, no standard ...
Nikolaos Stamatopoulos, Basilios Gatos, Ioannis Pr...
ICDAR
2009
IEEE
13 years 5 months ago
A Robust Wavelet Transform Based Technique for Video Text Detection
In this paper, we propose a new method based on wavelet transform, statistical features and central moments for both graphics and scene text detection in video images. The method ...
Palaiahnakote Shivakumara, Trung Quy Phan, Chew Li...