Sciweavers

15635 search results - page 3024 / 3127
» Modelling and Design of VAML
Sort
View
JCP
2007
127views more  JCP 2007»
15 years 4 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
126
Voted
TON
2008
86views more  TON 2008»
15 years 4 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
TON
2008
239views more  TON 2008»
15 years 4 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...
CG
2005
Springer
15 years 4 months ago
Realistic synthesis of cao shu of Chinese calligraphy
In Chinese calligraphy cao shu is regarded as a kind of free form art which differs from other styles greatly in its less constrained strokes and brush textures. In this paper we ...
Jinhui Yu, Qunsheng Peng
151
Voted
TPDS
2008
202views more  TPDS 2008»
15 years 4 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
« Prev « First page 3024 / 3127 Last » Next »