Sciweavers

2279 search results - page 294 / 456
» Robust Circle Detection
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis
— Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
ACSAC
2005
IEEE
15 years 10 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
PCM
2004
Springer
87views Multimedia» more  PCM 2004»
15 years 9 months ago
Easy and Convincing Ear Modeling for Virtual Human
In this paper, we describe the human ear creation in a system for 3-D photorealistic face modeling from frontal and profile images taken by an uncalibrated handheld digital camera...
Hui Zhang, In Kyu Park
ICNP
2003
IEEE
15 years 9 months ago
The Impact of False Sharing on Shared Congestion Management
Several recent proposals for sharing congestion information across concurrent flows between end-systems overlook an important problem: two or more flows sharing congestion state...
Aditya Akella, Srinivasan Seshan, Hari Balakrishna...
IH
2001
Springer
15 years 9 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu