Sciweavers

25316 search results - page 4785 / 5064
» Computational sensor networks
Sort
View
ICITA
2005
IEEE
15 years 10 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Video booklet
In this paper, we propose a novel system, Video Booklet, which enables efficient and nature video browsing and searching. In the system, a set of selected thumbnails excerpted fro...
Xian-Sheng Hua, Shipeng Li, Hong-Jiang Zhang
ICMCS
2005
IEEE
112views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Rate-Distortion Optimized Packet Scheduling Over Bottleneck Links
The loss and delay experienced by packets travelling along an Internet network path are mainly governed by the characteristics of a bottleneck link, such as available data rate an...
Jacob Chakareski, Pascal Frossard
ICPADS
2005
IEEE
15 years 10 months ago
An Evaluation Mechanism for QoS Management in Wireless Systems
The evaluation of QoS requirements is one of the critical functions that span both the design and the run-time phases of QoS management. This paper presents an architecture for Qo...
Behzad Bordbar, Rachid Anane, Kozo Okano
ICPADS
2005
IEEE
15 years 10 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
« Prev « First page 4785 / 5064 Last » Next »