Sciweavers

2237 search results - page 331 / 448
» Storing information with extractors
Sort
View
AINA
2006
IEEE
14 years 2 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
CNSR
2004
IEEE
218views Communications» more  CNSR 2004»
14 years 2 months ago
CSN: A Network Protocol for Serving Dynamic Queries in Large-Scale Wireless Sensor Networks
A fundamental problem that confronts future applications of sensor networks is how to efficiently locate the sensor node that stores a particular data item. It is known that distr...
Muneeb Ali, Zartash Afzal Uzmi
DEXAW
2004
IEEE
167views Database» more  DEXAW 2004»
14 years 2 months ago
BioMap: Gene Family based Integration of Heterogeneous Biological Databases Using AutoMed Metadata
This paper presents an extensible architecture that can be used to support the integration of biological data sets. Biological research frequently requires this kind of synthesis....
Michael Maibaum, Galia Rimon, Christine A. Orengo,...
DSD
2004
IEEE
97views Hardware» more  DSD 2004»
14 years 2 months ago
Scene Management Models and Overlap Tests for Tile-Based Rendering
Tile-based rendering (also called chunk rendering or bucket rendering) is a promising technique for low-power, 3D graphics platforms. This technique decomposes a scene into smalle...
Iosif Antochi, Ben H. H. Juurlink, Stamatis Vassil...
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
14 years 2 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop