Sciweavers

94 search results - page 10 / 19
» Losing control of the internet: using the data plane to atta...
Sort
View
IFIP
2005
Springer
14 years 1 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
AROBOTS
2008
223views more  AROBOTS 2008»
13 years 7 months ago
RoadCompass: following rural roads with vision + ladar using vanishing point tracking
Abstract-- We present a vision- and ladar-based approach to autonomous driving on rural and desert roads that has been tested extensively in a closed-loop system. The vision compon...
Christopher Rasmussen
MICCAI
2003
Springer
14 years 8 months ago
Tensor Splats: Visualising Tensor Fields by Texture Mapped Volume Rendering
Abstract. We describe a new method for visualising tensor fields using a textured mapped volume rendering approach, tensor-splatting. We use an image order method to calculate the ...
Abhir Bhalerao, Carl-Fredrik Westin
DSN
2011
IEEE
12 years 7 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 7 months ago
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must b...
Salah A. Aly, Ahmed E. Kamal