Sciweavers

248 search results - page 48 / 50
» Characterizing a spam traffic
Sort
View
KDD
2002
ACM
152views Data Mining» more  KDD 2002»
14 years 11 months ago
Multimedia Data Mining Framework For Raw Video Sequences
In this paper, we propose a general framework for real time video data mining to be applied to the raw videos (traffic videos, surveillance videos, etc.). We investigate whether t...
Jung-Hwan Oh, Babitha Bandi
GI
2007
Springer
14 years 5 months ago
Potentials and Requirements of Mobile Ubiquitous Computing for Public Transport
: Public transport plays an important role in our society which is characterized by mobility, individuality, comfort and ecological constraints. It is common opinion that public tr...
Holger Mügge, Karl-Heinz Lüke, Matthias ...
LCN
2006
IEEE
14 years 4 months ago
Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks
A collision resolution scheme is essential to the performance of a random-access wireless network. Most schemes employ exponential backoff (EB) to adjust the transmission attempt ...
Peng Xuan Zheng, Ying Jun Zhang, Soung Chang Liew
SASN
2006
ACM
14 years 4 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
PVG
2003
IEEE
138views Visualization» more  PVG 2003»
14 years 4 months ago
Sort-First, Distributed Memory Parallel Visualization and Rendering
While commodity computing and graphics hardware has increased in capacity and dropped in cost, it is still quite difficult to make effective use of such systems for general-purpos...
E. Wes Bethel, Greg Humphreys, Brian E. Paul, J. D...