Sciweavers

2079 search results - page 326 / 416
» Quantifying Information Flow
Sort
View
CONEXT
2010
ACM
13 years 8 months ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
IEEEIAS
2009
IEEE
13 years 7 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
INFOCOM
2010
IEEE
13 years 7 months ago
Optimal Control of Wireless Networks with Finite Buffers
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achie...
Long Bao Le, Eytan Modiano, Ness B. Shroff
IEEEVAST
2010
13 years 4 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
MVA
2010
229views Computer Vision» more  MVA 2010»
13 years 4 months ago
Robust 3D object registration without explicit correspondence using geometric integration
3D vision guided manipulation of components is a key problem of industrial machine vision. In this paper, we focus on the localization and pose estimation of known industrial objec...
Dirk Breitenreicher, Christoph Schnörr