Sciweavers

2874 search results - page 540 / 575
» Intrusion Detection: Systems and Models
Sort
View
CCR
2008
122views more  CCR 2008»
13 years 10 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
CG
2008
Springer
13 years 10 months ago
Practical global illumination for interactive particle visualization
Particle-based simulation methods are used to model a wide range of complex phenomena and to solve time-dependent problems of various scales. Effective visualizations of the resul...
Christiaan P. Gribble, Carson Brownlee, Steven G. ...
DM
2007
83views more  DM 2007»
13 years 9 months ago
Codes identifying sets of vertices in random networks
In this paper we deal with codes identifying sets of vertices in random networks; that is, (1, ≤ ℓ)-identifying codes. These codes enable us to detect sets of faulty processor...
Alan M. Frieze, Ryan Martin, Julien Moncel, Mikl&o...
MVA
2008
196views Computer Vision» more  MVA 2008»
13 years 9 months ago
Evaluation of an appearance-based 3D face tracker using dense 3D data
The ability to detect and track human heads and faces in video sequences can be considered as the finest level of any video surveillance system. In this paper, we introduce a gener...
Fadi Dornaika, Angel Domingo Sappa
IAJIT
2007
150views more  IAJIT 2007»
13 years 9 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...