Sciweavers

94 search results - page 16 / 19
» Losing control of the internet: using the data plane to atta...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 27 days ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
IWCMC
2006
ACM
14 years 1 months ago
Performance of Taroko: a cluster-based addressing and routing scheme for self-organized networks
Self-Organized Networks (SONs) are a general description of autonomous networks without infrastructure, of which Ad Hoc, Sensor and Mesh networks are special cases. We had previou...
Julien Ridoux, Meriem Kassar, Mathias Boc, Anne Fl...
JMIV
2010
131views more  JMIV 2010»
13 years 6 months ago
An SL(2) Invariant Shape Median
Median averaging is a powerful averaging concept on sets of vector data in finite dimensions. A generalization of the median for shapes in the plane is introduced. The underlying ...
Benjamin Berkels, Gina Linkmann, Martin Rumpf
FGCS
2007
90views more  FGCS 2007»
13 years 7 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
EPIA
2005
Springer
14 years 1 months ago
Visual Based Human Motion Analysis: Mapping Gestures Using a Puppet Model
Abstract. This paper presents a novel approach to analyze the appearance of human motions with a simple model i.e. mapping the motions using a virtual marionette model. The approac...
Jörg Rett, Jorge Dias