Sciweavers

8499 search results - page 1537 / 1700
» network 2007
Sort
View
ICPP
2007
IEEE
14 years 3 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
14 years 3 months ago
A Decision-Making Framework for Control Strategies in Probabilistic Search
Abstract— This paper presents the search problem formulated as a decision problem, where the searcher decides whether the target is present in the search region, and if so, where...
Timothy H. Chung, Joel W. Burdick
ICSNC
2007
IEEE
14 years 3 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
ICTAI
2007
IEEE
14 years 3 months ago
A Music Information Retrieval Approach Based on Power Laws
We present a music information retrieval approach based on power laws. Research in cognitive science and neuroscience reveals connections between power laws, human cognition, and ...
Patrick Roos, Bill Z. Manaris
IEEEIAS
2007
IEEE
14 years 3 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
« Prev « First page 1537 / 1700 Last » Next »