Sciweavers

899 search results - page 151 / 180
» On Wiretap Networks II
Sort
View
IJISEC
2011
71views more  IJISEC 2011»
13 years 8 days ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...
PAMI
2011
12 years 11 months ago
Shape Analysis of Elastic Curves in Euclidean Spaces
—This paper introduces a square-root velocity (SRV) representation for analyzing shapes of curves in Euclidean spaces under an elastic metric. Due to this SRV representation the ...
Anuj Srivastava, Eric Klassen, Shantanu H. Joshi, ...
IJCV
2010
574views more  IJCV 2010»
13 years 7 months ago
Time-Delayed Correlation Analysis for Multi-Camera Activity Understanding
We propose a novel approach to understanding activities from their partial observations monitored through multiple non-overlapping cameras separated by unknown time gaps. In our...
Chen Change Loy, Tao Xiang, Shaogang Gong
NDSS
2009
IEEE
14 years 3 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson
MOBICOM
2009
ACM
14 years 3 months ago
Interference management via rate splitting and HARQ over time-varying fading channels
The coexistence of two unlicensed links is considered, where one link interferes with the transmission of the other, over a timevarying, block-fading channel. In the absence of fa...
Marco Levorato, Osvaldo Simeone, Urbashi Mitra