Sciweavers

1016 search results - page 85 / 204
» Explore or Exploit
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Backtracking Algorithmic Complexity Attacks against a NIDS
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near...
Randy Smith, Cristian Estan, Somesh Jha
C5
2006
IEEE
14 years 3 months ago
3D Model Annotation from Multiple Viewpoints for Croquet
This paper explores ways by which multiple authors can annotate 3D models from multiple viewpoints in a 3D collaborative environment, with particular reference to the environment ...
Rieko Kadobayashi, Julian Lombardi, Mark P. McCahi...
ICMCS
2006
IEEE
157views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Using Rate-Distortion Metrics for Real-Time Internet Video Streaming with TCP
In this paper we explore use of a new rate-distortion metric for optimizing real-time Internet video streaming with the transmission control protocol (TCP). The basic idea is to c...
Antonios Argyriou
IRI
2006
IEEE
14 years 3 months ago
A new heuristic-based albeit complete method to extract MUCs from unsatisfiable CSPs
When a Constraint Satisfaction Problem (CSP) admits no solution, most current solvers express that the whole search space has been explored unsuccessfully but do not exhibit which...
Éric Grégoire, Bertrand Mazure, C&ea...
DATE
2005
IEEE
168views Hardware» more  DATE 2005»
14 years 2 months ago
Hardware Acceleration of Hidden Markov Model Decoding for Person Detection
This paper explores methods for hardware acceleration of Hidden Markov Model (HMM) decoding for the detection of persons in still images. Our architecture exploits the inherent st...
Suhaib A. Fahmy, Peter Y. K. Cheung, Wayne Luk