Sciweavers

1737 search results - page 60 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
EJWCN
2010
94views more  EJWCN 2010»
13 years 4 months ago
Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application
Information collection in the disaster area is an important application of pigeon networks - a special type of delay tolerant networks (DTN) that borrows the ancient idea of using ...
Jiazhen Zhou, Jiang Li, Legand L. Burge III
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 9 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
ISI
2007
Springer
14 years 3 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
IBPRIA
2003
Springer
14 years 2 months ago
Segmentation of Curvilinear Objects Using a~Watershed-Based Curve Adjacency Graph
Abstract. This paper presents a general framework to segment curvilinear objects in 2D images. A pre-processing step relies on mathematical morphology to obtain a connected line wh...
Thierry Géraud
ICCV
1995
IEEE
14 years 20 days ago
Task-Oriented Generation of Visual Sensing Strategies
This paper describes a method of systematically generating visual sensing strategies based on knowledge of the assembly task to be performed. Since visual sensing is usually perfo...
Jun Miura, Katsushi Ikeuchi