Sciweavers

247 search results - page 21 / 50
» Ideals without CCC
Sort
View
CCS
2007
ACM
14 years 1 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Streaming of Scalable Video from Multiple Servers using Rateless Codes
This paper presents a framework for efficiently streaming scalable video from multiple servers over heterogeneous network paths. We propose to use rateless codes, or Fountain cod...
Jean-Paul Wagner, Jacob Chakareski, Pascal Frossar...
GLVLSI
2005
IEEE
132views VLSI» more  GLVLSI 2005»
14 years 29 days ago
FPGA implementation of a modular and pipelined WF scheduler for high speed OC192 networks
In this paper we propose an FPGA implementation of a multi protocol Weighted Fair (WF) queuing algorithm able to handle variable length packets targeted for Packet Over Sonet (POS...
Abdallah Merhebi, Otmane Aït Mohamed
ICCV
2005
IEEE
14 years 29 days ago
An Integrated Framework for Image Segmentation and Perceptual Grouping
This paper presents an efficient algorithm for image segmentation and a framework for perceptual grouping. It makes an attempt to provide one way of combining bottomup and top-do...
Zhuowen Tu
ICRA
2005
IEEE
113views Robotics» more  ICRA 2005»
14 years 29 days ago
Symmetric Walking Control: Invariance and Global Stability
— This paper first presents a novel control strategy for periodic motion control based on a Hamiltonian system. According to the strategy, hybrid symmetric orbits (ideal walking...
Sang-Ho Hyon, Takashi Emura