Sciweavers

3819 search results - page 90 / 764
» Simple Easy Terms
Sort
View
KES
2005
Springer
14 years 3 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
IMR
2004
Springer
14 years 3 months ago
Watertight Anisotropic Surface Meshing Using Quadrilateral Patches
This paper presents a simple technique for generating anisotropic surface triangulations using a generic unstructured quadrilateral decomposition of CAD entities that map to a log...
Robert Haimes, Michael J. Aftosmis
CGI
2003
IEEE
14 years 3 months ago
Interpolatory Subdivision Curves via Diffusion of Normals
In this paper, we propose a new interpolatory subdivision scheme for generating nice-looking curvature-continuous curves of round shapes. The scheme is based on a diffusion of nor...
Yutaka Ohtake, Alexander G. Belyaev, Hans-Peter Se...
ACSAC
2002
IEEE
14 years 3 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
CDC
2009
IEEE
107views Control Systems» more  CDC 2009»
14 years 2 months ago
Learning approaches to the Witsenhausen counterexample from a view of potential games
— Since Witsenhausen put forward his remarkable counterexample in 1968, there have been many attempts to develop efficient methods for solving this non-convex functional optimiz...
Na Li, Jason R. Marden, Jeff S. Shamma