Sciweavers

796 search results - page 115 / 160
» Spoofing prevention method
Sort
View
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 1 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ARCS
2006
Springer
14 years 1 months ago
Estimating Energy Consumption for an MPSoC Architectural Exploration
Early energy estimation is increasingly important in MultiProcessor System-On-Chip (MPSoC) design. Applying traditional approaches, which consist in delaying the estimation until t...
Rabie Ben Atitallah, Smaïl Niar, Alain Greine...
AVSS
2006
IEEE
14 years 1 months ago
High-Quality Real Time Motion Detection Using PTZ Cameras
The approaches based on background difference are the most used with fixed cameras to perform motion detection, because of the high quality of the segmentation achieved. However, ...
Alessandro Bevilacqua, Pietro Azzari
DAGM
2006
Springer
14 years 1 months ago
Nonparametric Density Estimation for Human Pose Tracking
The present paper considers the supplement of prior knowledge about joint angle configurations in the scope of 3-D human pose tracking. Training samples obtained from an industrial...
Thomas Brox, Bodo Rosenhahn, Uwe G. Kersting, Dani...
PRICAI
2000
Springer
14 years 1 months ago
Improved Efficiency of Oil Well Drilling through Case Based Reasoning
A system that applies a method of knowledge-intensive case-based reasoning, for repair and prevention of unwanted events in the domain of offshore oil well drilling, has been deve...
Pål Skalle, Jostein Sveen, Agnar Aamodt