Sciweavers

196 search results - page 28 / 40
» On Isolating Points Using Disks
Sort
View
BROADNETS
2007
IEEE
14 years 2 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
OSDI
2002
ACM
14 years 8 months ago
An Analysis of Internet Content Delivery Systems
In the span of only a few years, the Internet has experienced an astronomical increase in the use of specialized content delivery systems, such as content delivery networks and pe...
Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn...
CP
2005
Springer
14 years 1 months ago
Mind the Gaps: A New Splitting Strategy for Consistency Techniques
Classical methods for solving numerical CSPs are based on a branch and prune algorithm, a dichotomic enumeration process interleaved with a consistency filtering algorithm. In man...
Heikel Batnini, Claude Michel, Michel Rueher
LCN
2003
IEEE
14 years 27 days ago
Secure and Manageable Virtual Private Networks for End-users
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...
TROB
2008
106views more  TROB 2008»
13 years 7 months ago
Discovering Higher Level Structure in Visual SLAM
We describe a novel method for discovering and incorporating higher level map structure in a real-time visual SLAM system. Previous approaches use sparse maps, populated by isolate...
Andrew P. Gee, Denis Chekhlov, Andrew Calway, Walt...