Sciweavers

151 search results - page 23 / 31
» Data-Oblivious Stream Productivity
Sort
View
127
Voted
SIGCOMM
2006
ACM
15 years 9 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
147
Voted
SIGUCCS
2004
ACM
15 years 9 months ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
174
Voted
SIGGRAPH
2010
ACM
15 years 2 months ago
Nonlinear disparity mapping for stereoscopic 3D
This paper addresses the problem of remapping the disparity range of stereoscopic images and video. Such operations are highly important for a variety of issues arising from the p...
Manuel Lang, Alexander Hornung, Oliver Wang, Steve...
128
Voted
CCE
2004
15 years 3 months ago
A general modeling framework for the operational planning of petroleum supply chains
In the literature, optimization models deal with planning and scheduling of several subsystems of the petroleum supply chain such as oilfield infrastructure, crude oil supply, ref...
Sérgio M. S. Neiro, José M. Pinto
117
Voted
EOR
2007
85views more  EOR 2007»
15 years 3 months ago
Modeling and analysis of a supply-assembly-store chain
We consider a supply–assembly–store chain with produce-to-stock strategy, which comprises a set of component suppliers, a mixed-model assembly line with a constantly moving co...
Xiaobo Zhao, Deju Xu, Hanqin Zhang, Qi-Ming He