Sciweavers

2125 search results - page 329 / 425
» Points with Type-2 Operations
Sort
View
TIFS
2008
154views more  TIFS 2008»
13 years 9 months ago
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
Ordered channels, such as those provided by Internet protocol and transmission control protocol protocols, rely on sequence numbers to recover from packet reordering due to network...
Juan M. Estévez-Tapiador, Julio Césa...
TITB
2008
117views more  TITB 2008»
13 years 9 months ago
Image-Based Gating of Intravascular Ultrasound Pullback Sequences
Intravascularultrasound (IVUS) sequences recorded in vivo are subject to a wide array of motion artifacts as the majority of these studies are performed within the coronary arterie...
Sean M. O'Malley, J. F. Granada, Stephane G. Carli...
TMC
2008
90views more  TMC 2008»
13 years 9 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
TON
2008
75views more  TON 2008»
13 years 9 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
JMIV
2007
116views more  JMIV 2007»
13 years 9 months ago
Viscosity Solutions of a Level-Set Method for Anisotropic Geometric Diffusion in Image Processing
We discuss the existence of viscosity solutions for a class of anisotropic level-set methods which can be seen as an extension of the mean-curvature motion with a nonlinear anisot...
Tobias Preusser