Sciweavers

2079 search results - page 326 / 416
» Quantifying Information Flow
Sort
View
CONEXT
2010
ACM
15 years 17 days ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
IEEEIAS
2009
IEEE
15 years 7 days ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
145
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Optimal Control of Wireless Networks with Finite Buffers
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achie...
Long Bao Le, Eytan Modiano, Ness B. Shroff
131
Voted
IEEEVAST
2010
14 years 9 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
126
Voted
MVA
2010
229views Computer Vision» more  MVA 2010»
14 years 9 months ago
Robust 3D object registration without explicit correspondence using geometric integration
3D vision guided manipulation of components is a key problem of industrial machine vision. In this paper, we focus on the localization and pose estimation of known industrial objec...
Dirk Breitenreicher, Christoph Schnörr