Sciweavers

1663 search results - page 166 / 333
» Computer Security in the Real World
Sort
View
KES
2005
Springer
15 years 9 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
CADE
2000
Springer
15 years 8 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
VIS
2007
IEEE
113views Visualization» more  VIS 2007»
16 years 5 months ago
Texture-based Feature Tracking for Effective Time-varying Data Visualization
Analyzing, visualizing, and illustrating changes within time-varying volumetric data is challenging due to the dynamic changes occurring between timesteps. The changes and variatio...
Jesus Caban, Alark Joshi, Penny Rheingans
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 10 months ago
3D Video and Free Viewpoint Video - Technologies, Applications and MPEG Standards
An overview of 3D and free viewpoint video is given in this paper with special focus on related standardization activities in MPEG. Free viewpoint video allows the user to freely ...
Aljoscha Smolic, Karsten Müller, Philipp Merk...
AI
2006
Springer
15 years 7 months ago
Partial Local FriendQ Multiagent Learning: Application to Team Automobile Coordination Problem
Real world multiagent coordination problems are important issues for reinforcement learning techniques. In general, these problems are partially observable and this characteristic ...
Julien Laumonier, Brahim Chaib-draa