Sciweavers

7587 search results - page 1355 / 1518
» Network Analysis and Visualisation
Sort
View
ICCV
2005
IEEE
14 years 1 months ago
Phase Field Models and Higher-Order Active Contours
The representation and modelling of regions is an important topic in computer vision. In this paper, we represent a region via a level set of a ‘phase field’ function. The fu...
Marie Rochery, Ian Jermyn, Josiane Zerubia
ICDCSW
2005
IEEE
14 years 1 months ago
Capacity Estimation of Non-Synchronous Covert Channels
Capacity estimation is an important part of covert channel analysis. It measures the severity of a covert channel by estimating the maximum information rate attainable over it. Tr...
Zhenghong Wang, Ruby B. Lee
ICITA
2005
IEEE
14 years 1 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
INFOCOM
2005
IEEE
14 years 1 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
INFOCOM
2005
IEEE
14 years 1 months ago
dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems
— We leverage the buffering capabilities of end-systems to achieve scalable, asynchronous delivery of streams in a peer-to-peer environment. Unlike existing cache-and-relay schem...
Abhishek Sharma, Azer Bestavros, Ibrahim Matta
« Prev « First page 1355 / 1518 Last » Next »