Sciweavers

1737 search results - page 243 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CVPR
2000
IEEE
15 years 7 months ago
Multiscale Combination of Physically-Based Registration and Deformation Modeling
1 In this paper we present a novel multiscale approach to recovery of nonrigid motion from sequences of registered intensity and range images. The main idea of our approach is that...
Leonid V. Tsap, Dmitry B. Goldgof, Sudeep Sarkar
138
Voted
MOBIHOC
2004
ACM
15 years 8 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
113
Voted
IMC
2005
ACM
15 years 8 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
145
Voted
ISPA
2004
Springer
15 years 8 months ago
Performance-Aware Load Balancing for Multiclusters
In a multicluster architecture, where jobs can be submitted through each constituent cluster, the job arrival rates in individual clusters may be uneven and the load therefore need...
Ligang He, Stephen A. Jarvis, David A. Bacigalupo,...
104
Voted
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 8 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...