Sciweavers

533 search results - page 37 / 107
» Control flow based obfuscation
Sort
View
129
Voted
NDSS
2009
IEEE
15 years 9 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
CIIT
2004
15 years 3 months ago
Scalable architecture for providing per-flow bandwidth guarantees
Despite numerous efforts, the problem of providing per-flow Quality of Service in a scalable manner still remains an active area of research. This paper introduces a scalable arch...
Vasil Hnatyshin, Adarshpal S. Sethi
120
Voted
TAPSOFT
1995
Springer
15 years 6 months ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg
ECCV
2006
Springer
15 years 6 months ago
Tracking of Multiple Objects Using Optical Flow Based Multiscale Elastic Matching
Abstract. A novel hybrid region-based and contour-based multiple object tracking model using optical flow based elastic matching is proposed. The proposed elastic matching model is...
Xingzhi Luo, Suchendra M. Bhandarkar
144
Voted
WINET
2010
127views more  WINET 2010»
15 years 25 days ago
A Markov Decision Process based flow assignment framework for heterogeneous network access
We consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, we address the problem of effici...
Jatinder Pal Singh, Tansu Alpcan, Piyush Agrawal, ...