Sciweavers

134 search results - page 25 / 27
» Experimental analysis of privacy loss in DCOP algorithms
Sort
View
ACSAC
2007
IEEE
14 years 23 days ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
CCS
2010
ACM
13 years 9 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
WWW
2007
ACM
14 years 9 months ago
Query-driven indexing for peer-to-peer text retrieval
We describe a query-driven indexing framework for scalable text retrieval over structured P2P networks. To cope with the bandwidth consumption problem that has been identified as ...
Gleb Skobeltsyn, Toan Luu, Karl Aberer, Martin Raj...
POPL
2008
ACM
14 years 9 months ago
Generating precise and concise procedure summaries
We present a framework for generating procedure summaries that are precise -- applying the summary in a given context yields the same result as re-analyzing the procedure in that ...
Greta Yorsh, Eran Yahav, Satish Chandra
CVPR
2009
IEEE
1626views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Coded Exposure Deblurring: Optimized Codes for PSF Estimation and Invertibility
We consider the problem of single image object motion deblurring from a static camera. It is well known that deblurring of moving objects using a traditional camera is ill-posed, d...
Amit K. Agrawal, Yi Xu