Sciweavers

9949 search results - page 1808 / 1990
» On the Network Complexity of Selection
Sort
View
118
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 11 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
138
Voted
ICDCS
2007
IEEE
15 years 11 months ago
Overlay Node Placement: Analysis, Algorithms and Impact on Applications
Abstract— Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential of overlay routing under ...
Sabyasachi Roy, Himabindu Pucha, Zheng Zhang, Y. C...
ICDCS
2007
IEEE
15 years 11 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
140
Voted
ICIP
2007
IEEE
15 years 11 months ago
Packet Loss Resilient Transmission of 3D Models
This paper presents an efficient joint source-channel coding scheme based on forward error correction (FEC) for three dimensional (3D) models. The system employs a wavelet based ...
M. Oguz Bici, Andrey Norkin, Gozde Bozdagi Akar
147
Voted
IJCNN
2007
IEEE
15 years 11 months ago
Philosophical Aspects of Neural, Probabilistic and Fuzzy Modeling of Language Use and Translation
— Serious efforts to develop computerized systems for natural language understanding and machine translation have taken place for more than half a century. Some successful system...
Timo Honkela
« Prev « First page 1808 / 1990 Last » Next »