Sciweavers

151 search results - page 23 / 31
» Data-Oblivious Stream Productivity
Sort
View
SIGCOMM
2006
ACM
14 years 1 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
SIGUCCS
2004
ACM
14 years 29 days ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
SIGGRAPH
2010
ACM
13 years 6 months ago
Nonlinear disparity mapping for stereoscopic 3D
This paper addresses the problem of remapping the disparity range of stereoscopic images and video. Such operations are highly important for a variety of issues arising from the p...
Manuel Lang, Alexander Hornung, Oliver Wang, Steve...
CCE
2004
13 years 7 months ago
A general modeling framework for the operational planning of petroleum supply chains
In the literature, optimization models deal with planning and scheduling of several subsystems of the petroleum supply chain such as oilfield infrastructure, crude oil supply, ref...
Sérgio M. S. Neiro, José M. Pinto
EOR
2007
85views more  EOR 2007»
13 years 7 months ago
Modeling and analysis of a supply-assembly-store chain
We consider a supply–assembly–store chain with produce-to-stock strategy, which comprises a set of component suppliers, a mixed-model assembly line with a constantly moving co...
Xiaobo Zhao, Deju Xu, Hanqin Zhang, Qi-Ming He