— Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: ...
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
In this paper, we describe the human ear creation in a system for 3-D photorealistic face modeling from frontal and profile images taken by an uncalibrated handheld digital camera...
Several recent proposals for sharing congestion information across concurrent flows between end-systems overlook an important problem: two or more flows sharing congestion state...
Aditya Akella, Srinivasan Seshan, Hari Balakrishna...
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...