Sciweavers

796 search results - page 123 / 160
» Spoofing prevention method
Sort
View
JHSN
2000
172views more  JHSN 2000»
13 years 9 months ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...
JCC
2002
74views more  JCC 2002»
13 years 9 months ago
Determination of the effective dielectric constant from the accurate solution of the Poisson equation
: Constant dielectric (CD) and distance-dependent dielectric (DDD) functions are the most popular and widespread in the Molecular Mechanics simulations of large molecular systems. ...
Vladislav Vasilyev
JEI
2008
129views more  JEI 2008»
13 years 8 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...
IJISTA
2010
100views more  IJISTA 2010»
13 years 8 months ago
Development of an awakening detection system with the NN and adaptation for fluctuation of brightness quantity in the captured i
Recently, accidents such that seniors fall down from the bed in care facilities or hospitals are increased. To prevent these accidents, we have developed an awakening detection sys...
Nobuhisa Yamanaka, Hironobu Satoh, Fumiaki Takeda
PKDD
2010
Springer
150views Data Mining» more  PKDD 2010»
13 years 8 months ago
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms
Given a contact network that changes over time (say, day vs night connectivity), and the SIS (susceptible/infected/susceptible, flu like) virus propagation model, what can we say ...
B. Aditya Prakash, Hanghang Tong, Nicholas Valler,...