Sciweavers

912 search results - page 143 / 183
» Anomaly
Sort
View
ICNP
2002
IEEE
14 years 1 months ago
Analysis of the MED Oscillation Problem in BGP
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement “cold potato routing” between autonomous systems. However, the us...
Timothy Griffin, Gordon T. Wilfong
CHI
2009
ACM
14 years 1 months ago
The problem of consistency in the design of Fitts' law experiments: consider either target distance and width or movement form a
An intriguing anomaly of the usual way of designing Fitts’ law experiments in experimental psychology and HCI is exposed: experiments are traditionally designed so as to careful...
Yves Guiard
DIM
2009
ACM
14 years 1 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
MICCAI
2009
Springer
14 years 1 months ago
Bayesian Maximal Paths for Coronary Artery Segmentation from 3D CT Angiograms
We propose a recursive Bayesian model for the delineation of coronary arteries from 3D CT angiograms (cardiac CTA) and discuss the use of discrete minimal path techniques as an e...
David Lesage, Elsa D. Angelini, Isabelle Bloch, Ga...
IH
2001
Springer
14 years 1 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar