Sciweavers

329 search results - page 40 / 66
» Observability of vortex flows
Sort
View
CONEXT
2006
ACM
13 years 11 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
ATAL
2008
Springer
13 years 9 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ATAL
2008
Springer
13 years 9 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CIC
2004
13 years 9 months ago
Audio Quality for a Simple Forward Error Correcting Code
The aim of this paper is to study the audio quality offered by a simple Forward Error Correction (FEC) code used in audio applications like Freephone or Rat. This coding technique ...
Yvan Calas, Alain Jean-Marie
BMVC
2000
13 years 9 months ago
Recognizing Objects From Curvilinear Motion
This paper introduces an object recognition strategy based on the following premises: i) an object can be identified on the basis of the optical flow it induces on a stationary ob...
Tal Arbel, Frank P. Ferrie, Marcel Mitran