Sciweavers

1184 search results - page 94 / 237
» Nearness relations and topology
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 4 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
CDC
2008
IEEE
116views Control Systems» more  CDC 2008»
14 years 4 months ago
Stability of Zeno equilibria in Lagrangian hybrid systems
— This paper presents both necessary and sufficient conditions for the stability of Zeno equilibria in Lagrangian hybrid systems, i.e., hybrid systems that model mechanical syst...
Yizhar Or, Aaron D. Ames
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 4 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
ICMCS
2008
IEEE
145views Multimedia» more  ICMCS 2008»
14 years 4 months ago
Video search reranking via online ordinal reranking
To exploit co-occurrence patterns among features and target semantics while keeping the simplicity of the keywordbased visual search, a novel reranking methods is proposed. The ap...
Yi-Hsuan Yang, Winston H. Hsu
ISCAS
2008
IEEE
147views Hardware» more  ISCAS 2008»
14 years 4 months ago
An asynchronous time-based image sensor
Abstract— In this paper we propose a fully asynchronous, timebased image sensor, which is characterized by high temporal resolution, low data rate (near complete temporal redunda...
Christoph Posch, Daniel Matolin, Rainer Wohlgenann...