Sciweavers

1621 search results - page 251 / 325
» Detecting Experiences from Weblogs
Sort
View
ISVC
2009
Springer
14 years 2 months ago
Exploiting Mutual Camera Visibility in Multi-camera Motion Estimation
Abstract. This paper addresses the estimation of camera motion and 3D reconstruction from image sequences for multiple independently moving cameras. If multiple moving cameras reco...
Christian Kurz, Thorsten Thormählen, Bodo Ros...
RAID
2009
Springer
14 years 2 months ago
Using Formal Grammar and Genetic Operators to Evolve Malware
In this paper, we leverage the concepts of formal grammar and genetic operators to evolve malware. As a case study, we take COM infectors and design their formal grammar with produ...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
DSN
2008
IEEE
14 years 2 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 2 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
ICC
2008
IEEE
130views Communications» more  ICC 2008»
14 years 2 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera