Sciweavers

348 search results - page 42 / 70
» Offline firewall analysis
Sort
View
IVCNZ
1998
13 years 11 months ago
Duality Principles in Image Processing and Analysis
Duality is a well-established concept in quantum physics. It formalises the fact that what one observes is not nature in itself, but--in Heisenberg's words--"nature expo...
Luc Florack
MINENET
2006
ACM
14 years 3 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
DMIN
2006
124views Data Mining» more  DMIN 2006»
13 years 11 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea
COMPGEOM
2006
ACM
14 years 1 months ago
I/O-efficient batched union-find and its applications to terrain analysis
Despite extensive study over the last four decades and numerous applications, no I/O-efficient algorithm is known for the union-find problem. In this paper we present an I/O-effic...
Pankaj K. Agarwal, Lars Arge, Ke Yi
COMCOM
2008
135views more  COMCOM 2008»
13 years 9 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan