Sciweavers

35419 search results - page 93 / 7084
» How are we doing
Sort
View
RIAO
2007
15 years 5 months ago
SportsAnno: What Do You Think?
The automatic summarisation of sports video is of growing importance with the increased availability of on-demand content. Consumers who are unable to view events live often have ...
James Lanagan, Alan F. Smeaton
131
Voted
AIPS
2010
15 years 3 months ago
Coming Up With Good Excuses: What to do When no Plan Can be Found
When using a planner-based agent architecture, many things can go wrong. First and foremost, an agent might fail to execute one of the planned actions for some reasons. Even more ...
Moritz Göbelbecker, Thomas Keller, Patrick Ey...
136
Voted
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
15 years 9 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
117
Voted
WSC
1998
15 years 5 months ago
So You Have Your Model: What to Do Next. A Tutorial on Simulation Output Analysis
Simulation models are built with the intent of studying the behavior of the real system represented by the model. However, a simulation model generates random outputs; thus, the d...
Martha A. Centeno, M. Florencia Reyes
132
Voted
IJNSEC
2008
201views more  IJNSEC 2008»
15 years 3 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...