|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 570 occurrences of 414 keywords
|
|
|
Results
Found 1825 publication records. Showing 1825 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
97 | Steven J. Simske, Margaret Sturgill, Jason S. Aronoff |
Effect of copying and restoration on color barcode payload density. |
ACM Symposium on Document Engineering |
2009 |
DBLP DOI BibTeX RDF |
3d bar codes, color compensation, color tiles, payload density, security printing, image restoration |
79 | Sayantan Choudhury, Irfan Sheriff, Jerry D. Gibson, Elizabeth M. Belding-Royer |
Effect of payload length variation and retransmissions on multimedia in 802.11a WLANs. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
payload adaptation, rate adaptation, retransmissions, multimedia transmission, IEEE 802.11a |
79 | Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon |
Payload attribution via hierarchical bloom filters. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
ForNet, hierarchical bloom filters, payload attribution, security |
76 | Sunghyun Kim, Heejo Lee |
Reducing Payload Scans for Attack Signature Matching Using Rule Classification. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein |
Highly efficient techniques for network forensics. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
payload attribution, bloom filter, network forensics |
72 | Ahmed O. El-Rayis, Anatoly O. Melnyk |
Localized Payload Management Approach to Payload Control and Data Acquisition Architecture for Space Applications. |
AHS |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Sayantan Choudhury, Jerry D. Gibson |
Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Hongfei Sui, Jianer Chen, Songqiao Chen, Jianxin Wang 0001 |
Payload analysis of anonymous communication system with host-based rerouting mechanism. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Jee-Hwan Ryu, Dong-Soo Kwon, Youngjin Park |
A Robust Controller Design Method for a Flexible Manipulator with a Large Time Varying Payload and Parameter Uncertainties. |
J. Intell. Robotic Syst. |
2000 |
DBLP DOI BibTeX RDF |
descaling technique, descriptor form, payload variation, polytopic approach, robust control, flexible manipulator, parameter uncertainty |
58 | Sayantan Choudhury, Jerry D. Gibson |
Payload Length and Rate Adaptation for Multimedia Communications in Wireless LANs. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Like Zhang, Gregory B. White |
Analysis of Payload Based Application level Network Anomaly Detection. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Roberto Perdisci, Guofei Gu, Wenke Lee |
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. |
ICDM |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo |
Transport Layer Identification of Skype Traffic. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Terence Kelly, Jeffrey C. Mogul |
Aliasing on the world wide web: prevalence and performance implications. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
duplicate suppression, duplicate transfer detection, redundant transfers, resource modification, WWW, world wide web, performance analysis, caching, HTTP, aliasing, DTD, cache hierarchies, Zipf's law, hypertext transfer protocol |
49 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
48 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS. |
ANCS |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
48 | Ye-Kui Wang |
AVS-M: From Standards to Applications. |
J. Comput. Sci. Technol. |
2006 |
DBLP DOI BibTeX RDF |
AVS-M, RTP payload format, standard, video coding, file format |
44 | Katsuya Watabe, Tetsuya Saito, Nobutaka Matsumoto, Takuo Tanemura, Hideaki Imaizumi, Abdullah Al Amin, Mitsuru Takenaka, Yoshiaki Nakano, Hiroyuki Morikawa |
80Gb/s Multi-wavelength Optical Packet Switching Using PLZT Switch. |
ONDM |
2007 |
DBLP DOI BibTeX RDF |
multi-wavelength, optical packet, PLZT switch, WDM |
44 | Thomas Karagiannis, Andre Broido, Michalis Faloutsos, Kimberly C. Claffy |
Transport layer identification of P2P traffic. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
peer-to-peer, measurements, traffic classification |
44 | Michael Kontitsis, R. D. Garcia, Kimon P. Valavanis |
Design, Implementation and Testing of a Vision System for Small Unmanned Vertical Take off and Landing Vehicles with Strict Payload Limitations. |
J. Intell. Robotic Syst. |
2005 |
DBLP DOI BibTeX RDF |
on-board processing, on-the-ground processing, payload limitations, vertical take off and landing, unmanned vehicles |
40 | Jun Ma, Guanzhong Dai, Jing Zhou |
Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Farhad Aghili |
Impedance control of manipulators carrying a heavy payload. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Chad D. Mano, Andrew Blaich, Qi Liao 0002, Yingxin Jiang, David A. Cieslak, David Salyers, Aaron Striegel |
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
rogue systems, network security, traffic conditioning |
40 | Andrew D. Ker |
Locating steganographic payload via ws residuals. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
weighted stego-image, steganalysis, forensics |
40 | Hongmei Gou, Min Wu 0001 |
Improving Embedding Payload in Binary Imageswith "Super-Pixels". |
ICIP (3) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Chin Pei Tang, Rajankumar Bhatt, Venkat Krovi |
Decentralized Kinematic Control of Payload by a System of Mobile Manipulators. |
ICRA |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Ke Wang 0009, Salvatore J. Stolfo |
Anomalous Payload-Based Network Intrusion Detection. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Moussa Habib, Sami Sarhan, Lama Rajab |
A Robust-Fragile Dual Watermarking System in the DCT Domain. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
data payload (capacity), biometric signature, Discrete Cosine Transform (DCT), Fragile watermark, Spatial Domain, Robust watermark, Transform Domain |
39 | Thomas Schierl, Markus Kampmann, Thomas Wiegand |
H.264/AVC interleaving for 3G wireless video streaming. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
retransmission buffer, H.264-AVC interleaving framework, 3G wireless video streaming, RTP payload format, NAL unit, block error rate, packet-switching, real-time transport protocol |
36 | Yier Jin, Yiorgos Makris |
Hardware Trojan Detection Using Path Delay Fingerprint. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
36 | William E. Singhose, Dooroo Kim |
Manipulation with Tower Cranes Exhibiting Double-Pendulum Oscillations. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Md. Nurul Islam, Atsuhi Kara |
Throughput Analysis of SCTP over a Multi-homed Association. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
Data Chunk, Association Throughput, Transport Protocol, Stream Control Transmission Protocol, Multi-homing |
36 | James Moscola, Young H. Cho, John W. Lockwood |
Implementation of Network Application Layer Parser for Multiple TCP/IP Flows in Reconfigurable Devices. |
FPL |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
36 | Adam L. Young |
Building a Cryptovirus Using Microsoft's Cryptographic API. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Zhenxing Qian, Xinpeng Zhang 0001, Shuozhong Wang |
Matrix Selection in High Payload Embedding. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
matrix embedding, high payload, security, data hiding |
32 | Michele D. Carpenter, Mason A. Peck |
Dynamics of a High-Agility, Low-Power Imaging Payload. |
IEEE Trans. Robotics |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Chin-Chen Chang 0001, The Duc Kieu, Yung-Chen Chou |
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
32 | M. Abou-Samah, Chin Pei Tang, Rajankumar Bhatt, Venkat Krovi |
A kinematically compatible framework for cooperative payload transport by nonholonomic mobile manipulators. |
Auton. Robots |
2006 |
DBLP DOI BibTeX RDF |
Physical cooperation, Virtual prototyping, Mobile manipulator, Composite system, Hardware-in-the-loop, Redundancy resolution |
32 | Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo |
Anomalous Payload-Based Worm Detection and Signature Generation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Fang Hao, Murali S. Kodialam, T. V. Lakshman, Hui Zhang 0002 |
Fast payload-based flow estimation for traffic monitoring and network security. |
ANCS |
2005 |
DBLP DOI BibTeX RDF |
network security, traffic monitoring, traffic estimation |
32 | Mauro Marinelli, Riccardo Giubilei |
A Regenerative Payload for Satellite Multimedia Communications. |
IEEE Multim. |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Maurice Maes, Ton Kalker, Jaap Haitsma, Geert Depovere |
Exploiting Shift Invariance to Obtain a High Payload in Digital Image Watermarking. |
ICMCS, Vol. 1 |
1999 |
DBLP DOI BibTeX RDF |
multimedia data security, digital watermarking |
32 | Vicente B. Feliu, José A. Somolinos, Carlos Cerrada, José Antonio Cerrada |
A New Control Scheme of Single-link Flexible Manipulators Robust to Payload Changes. |
J. Intell. Robotic Syst. |
1997 |
DBLP DOI BibTeX RDF |
control of flexible arms, computer control, feedforward control, robot control, robust control |
30 | Elie Bursztein |
Probabilistic Identification for Hard to Classify Protocol. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
payload analysis, header discriminator, p2p, traffic classification |
30 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
30 | Sang-Ho Lee, Chong-Won Lee |
Hybrid Control Scheme for Robust Tracking of Two-Link Flexible Manipulator. |
J. Intell. Robotic Syst. |
2002 |
DBLP DOI BibTeX RDF |
hybrid control scheme, two-link flexible manipulator, flexible vibrations, hybrid trajectories, virtual control force, robust tracking control, composite control scheme, payload uncertainty, variable structure control |
30 | Sang-Ho Lee, Chong-Won Lee |
Hybrid Control Scheme for Robust Tracking of Two-Link Flexible Manipulator. |
J. Intell. Robotic Syst. |
2001 |
DBLP DOI BibTeX RDF |
hybrid control scheme, two-link flexible manipulator, flexible vibrations, hybrid trajectories, virtual control force, robust tracking control, composite control scheme, payload uncertainty, variable structure control |
30 | Ahmed Mehaoua, Raouf Boutaba, Guy Pujolle |
An adaptive and selective cell drop policy with dynamic data partitioning for best effort video over ATM. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
selective cell drop policy, dynamic data partitioning, best effort video, ATM best effort services, MPEG based video delivery framework, unspecified bit rate, video oriented cell discarding scheme, switch buffer occupancy, video cell payload types, dynamic frame level priority data partition mechanism, MPEG data structure, enhanced ATM Adaptation Layer type 5, slice based MPEG2 encapsulation strategy, video delivery framework, real MPEG video data, asynchronous transfer mode, available bit rate |
28 | Mangang Xie, Baozhen An, Changhao Song, Qianqian Wang, Meng Zhou, Xiangdong Jia |
Updating Not Just Payload but Payload and Extra Data Simultaneously in Real-Time IoT Networks. |
ICCE-Taiwan |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Yunfan Ren, Jianheng Liu, Haoyao Chen, Yunhui Liu |
Vision-encoder-based Payload State Estimation for Autonomous MAV With a Suspended Payload. |
IROS |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Taketo Sugaya, Toshiyuki Murakami |
Velocity and Attitude Control of Quadcopter with Suspended-payload using Disturbance Observer with Payload Inclination Suppression. |
AMC |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Joan Francesc Muñoz-Martín, Lara Fernández, Joan Adrià Ruiz De Azua, Adriano Camps |
The Flexible Microwave Payload -2: Architecture and Testing of a Combined GNSS-R and L-Band Radiometer With RFI Mitigation Payload For Cubesat-Based Earth Observation Missions. |
IGARSS |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Mohsen Kakavand, Norwati Mustapha, Aida Mustapha, Mohd Taufik Abdullah |
Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload. |
KSII Trans. Internet Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jian-Shiang Chen, Chia-Hsiang Menq |
Experiments on the payload-adaptation of a flexible one-link manipulation with unknown payload. |
ICRA |
1990 |
DBLP DOI BibTeX RDF |
|
27 | Muhammad Ali Akbar, Muddassar Farooq |
RTP-miner: a real-time security framework for RTP fuzzing attacks. |
NOSSDAV |
2010 |
DBLP DOI BibTeX RDF |
fuzzing attacks, machine learning, denial of service, stochastic models, real-time transport protocol, voip |
27 | Yongjian Hu, Heung-Kyu Lee, Jianwei Li |
DE-Based Reversible Data Hiding With Improved Overflow Location Map. |
IEEE Trans. Circuits Syst. Video Technol. |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Guorong Xuan, Yun Q. Shi 0001, Peiqi Chai, Jianzhong Teng, Zhicheng Ni, Xuefeng Tong |
Optimum Histogram Pair Based Image Lossless Data Embedding. |
Trans. Data Hiding Multim. Secur. |
2009 |
DBLP DOI BibTeX RDF |
optimum histogram pair, reversible (lossless) data embedding, selection of best threshold, adaptive histogram modification, selection of suitable embedding region, integer wavelets |
27 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris |
Hardware implementation for network intrusion detection rules with regular expression support. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
security, FPGAs, intrusion detection, network intrusion detection system |
27 | Alvaro Luis, Miguel A. Patricio |
Scalable Streaming of JPEG 2000 Live Video Using RTP over UDP. |
DCAI |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Guorong Xuan, Yun Q. Shi 0001, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong |
Optimum Histogram Pair Based Image Lossless Data Embedding. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
Optimum histogram pair, lossless data embedding, selection of best threshold, adaptive histogram modification, selection of suitable embedding region, integer wavelets |
27 | Yingqiu Liu, Wei Li 0125, Yunchun Li |
Network Traffic Classification Using K-means Clustering. |
IMSCCS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Chun-Ming Leung, Yuen-Yan Chan |
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics. |
WETICE |
2007 |
DBLP DOI BibTeX RDF |
Enterprise Network Security, Network Foren- sics, Traffic Prioritiza- tion, Reverse Engineering, Blocking, Traffic Analysis, Skype, NAT Traversal |
27 | Yongjian Hu, Byeungwoo Jeon |
Reversible Visible Watermarking and Lossless Recovery of Original Images. |
IEEE Trans. Circuits Syst. Video Technol. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Conor James Walsh, Kenneth Pasch, Hugh M. Herr |
An autonomous, underactuated exoskeleton for load-carrying augmentation. |
IROS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mong-Fong Horng, Chun-Wei Chen, Chin-Shun Chuang, Cheng-Yu Lin |
Identification and Analysis of P2P Traffic- An Example of BitTorrent. |
ICICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi 0001, Zhicheng Ni |
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
Histogram Shifting, Lossless Data Hiding, Integer Wavelets |
27 | Dimitris Tsiokos, Efstratios Kehayas, Paraskevas Bakopoulos, Dimitrios Apostolopoulos, Dimitrios Petrantonakis, Nikos Pleros, Hercules Avramopoulos |
All-Optical Signal Processing Using Integrated Mach Zehnder Interferometric Switches for 40 Gb/s All-Optical Label-Swapped Networks. |
BROADNETS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | En Cheng, Hai Jin 0001, Zongfen Han, Jianhua Sun 0002 |
Network-Based Anomaly Detection Using an Elman Network. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Benjamin Lok, Samir Naik, Mary C. Whitton, Frederick P. Brooks Jr. |
Incorporating dynamic real objects into immersive virtual environments. |
SI3D |
2003 |
DBLP DOI BibTeX RDF |
interactions in virtual environments, mixed reality, collision detection |
27 | Sung-Ho Ahn, Min-Gyu Kang, Doo-Hyun Kim, Hyung Chul Kim |
QoS Adaptive MPEG-2 Streaming Based on Scalable Media Object Framework. |
ICOIN |
2001 |
DBLP DOI BibTeX RDF |
|
27 | A. M. Shahri, B. J. Evans, Fazel Naghdy |
Neuro-fuzzy adaptive torque control of a SCARA robot. |
ANZIIS |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Fangqi Sun, Liang Xu, Zhendong Su 0001 |
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
cross-site scripting worm, client-side detection, Web application security |
23 | Fulvio Risso, Mario Baldi, Olivier Morandi, Andrea Baldini, Pere Monclus |
Lightweight, Payload-Based Traffic Classification: An Experimental Evaluation. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Raymond J. Jayabal, Chiew Tong Lau |
A Payload-Dropping CSMA/CA Protocol for Improving Spatial Reuse of Wireless Local and Personal Area Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto |
Network Application Identification Using Transition Pattern of Payload Length. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | M. Patrick Collins, Michael K. Reiter |
On the Limits of Payload-Oblivious Network Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network intrusion detection, ROC curve |
23 | Sasa Mrdovic, Branislava Perunicic |
NIDS based on payload word frequencies and anomaly of transitions. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Nnamdi Nwanze, Douglas Summerville |
Detection of anomalous network packets using lightweight stateless payload inspection. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Peng Zhang, Yuan-chuan Li |
Simulations and Trajectory Tracking of Two Manipulators Manipulating a Flexible Payload. |
RAM |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yi Chen 0020, Matthew P. Cartmell |
Multi-objective optimisation on motorised momentum exchange tether for payload orbital transfer. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Aminian, Mohammad K. Akbari, Bahman Javadi |
Coordinated checkpoint from message payload in pessimistic sender-based message logging. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Huanbao Wang, Yousheng Zhang, Yuan Li |
Modeling for Security Verification of a Cryptographic Protocol with MAC Payload. |
ICIC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Alessio Salerno, Jorge Angeles |
The Control of Semi-autonomous Two-wheeled Robots undergoing large Payload-variations. |
ICRA |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Steve Carr 0001, Philip H. Sweany |
Automatic data partitioning for the agere payload plus network processor. |
CASES |
2004 |
DBLP DOI BibTeX RDF |
scheduling, partitioning, network processors |
23 | Taeshik Shon, Jongsub Moon, Sangjin Lee 0002, Dong Hoon Lee 0001, Jongin Lim 0001 |
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Kimon P. Valavanis, C. A. Jacobson, B. H. Gold |
Integration control and failure detection with application to the robot payload variation problem. |
J. Intell. Robotic Syst. |
1991 |
DBLP DOI BibTeX RDF |
Four parameter controller, failure and diagnostic system, diagnostic capability, disturbance monitor, doubly coprime fractional representation, proportional and derivative controller |
21 | Aruna Jamdagni, Zhiyuan Tan 0001, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu |
Intrusion detection using GSAD model for HTTP traffic on web services. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
GSAD model, intrusion detection, attack, HTTP, payload |
21 | Noboru Harada, Yutaka Kamamoto, Takehiro Moriya |
Lossless Compression of Mapped Domain Linear Prediction Residual for ITU-T Recommendation G.711.0. |
DCC |
2010 |
DBLP DOI BibTeX RDF |
ITU-T Recommendation G.711.0, Lossless compression of G.711 payload, Plus-Minus zero mapping, Escaped-Huffman coding, Adaptive recursive Rice coding, Mapped domain linear predictive coding, Standardization, Speech coding |
21 | Jihah Nah, JongWeon Kim, Jaeseok Kim |
A New Image Watermarking Using Peak Position Modulation for ID Photos. |
ISM |
2009 |
DBLP DOI BibTeX RDF |
ID forgery detection, Peak Position Modulation, Robustness, Watermarking, Spread Spectrum, Payload |
21 | Jihah Nah, JongWeon Kim, Jaeseok Kim |
A new robust forensic marking using peak position modulation for video. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
peak position modulation, video forensic marking, robustness, spread spectrum, 3D wavelet transform, payload |
21 | Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris |
Reverse Engineering: EDOWA Worm Analysis and Classification. |
World Congress on Engineering (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
worm analysis, worm classification, Classification, payload |
21 | Peter Teufl, Udo Payer, Michael Amling, Martin Godec, Stefan Ruff, Gerhard Scheikl, Gernot Walzl |
InFeCT - Network Traffic Classification. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
network traffic classification, payload histogram, machine learning, feature extraction, tool, open source, policy verification |
21 | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai |
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Polymorphic Worm Detection, Abstract Payload Execution |
21 | Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee 0001 |
Countering Security Information Overload through Alert and Packet Visualization. |
IEEE Computer Graphics and Applications |
2006 |
DBLP DOI BibTeX RDF |
alert visualization, payload visualization, packet visualization, log visualization, network visualization |
21 | Madihah Saudi, Nazean Jomhari |
Knowledge Structure on Virus for User Education. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
user education, mechanism trigger, operating algorithm, virus type, propagation, virus, severity, symptom, payload |
21 | Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen |
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
binary object visualization, payload visualization, binary navigation, packet visualization, reverse engineering, network visualization |
21 | Gerald Kühne, Christoph Kuhmünch |
Transmitting MPEG-4 video streams over the Internet: problems and solutions. |
ACM Multimedia (2) |
1999 |
DBLP DOI BibTeX RDF |
RTP payload, video on demand, MPEG-4, real-time transport protocol |
Displaying result #1 - #100 of 1825 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|