|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 37 occurrences of 29 keywords
|
|
|
Results
Found 88 publication records. Showing 88 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
103 | Robert Cypher, C. Bernard Shung |
Generalized trace-back techniques for survivor memory management in the Viterbi algorithm. |
J. VLSI Signal Process. |
1993 |
DBLP DOI BibTeX RDF |
trace-back, survivor memory, VLSI area requirements, Viterbi algorithm |
53 | Pasin Israsena, Izzet Kale |
A high-speed, low-power interleaved trace-back memory for Viterbi decoder. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Fabian Angarita, Ma José Canet, T. Sansaloni, Javier Valls, Vicenc Almenar-Terre |
Architectures for the Implementation of a OFDM-WLAN Viterbi Decoder. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
wireless LAN, OFDM, viterbi |
50 | Yun-Nan Chang |
An Efficient In-Place VLSI Architecture for Viterbi Algorithm. |
J. VLSI Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
register-exchange, trace-back, ACS unit, Viterbi decoder |
36 | Pai Peng, Peng Ning, Douglas S. Reeves |
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yun-Nan Chang |
Design of soft-output Viterbi decoders with hybrid trace-back processing. |
ISCAS (2) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Subburaj Thangavel, Suthendran Kannan |
Detection and trace back of low and high volume of distributed denial-of-service attack based on statistical measures. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Junsong Fu, Na Wang 0003, Leyao Nie, Baojiang Cui, Bharat K. Bhargava |
Defending Trace-Back Attack in 3D Wireless Internet of Things. |
IEEE/ACM Trans. Netw. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Madhumitha Kulandaivel, Arulanand Natarajan |
Network Support for IP Trace Back Model in Wireless Sensor Networks Using Quantum Annealing Method. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Tri Khai Lam, Jon Heales, Nicole Hartley |
Perceived Risk Triggers the Effects of Trace-Back Information on Consumer Trust. |
AMCIS |
2022 |
DBLP BibTeX RDF |
|
19 | Sara Asgari, Babak Sadeghiyan |
Reconstruction of Worm Propagation Path Using a Trace-back Approach. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Johannes Krupp |
Using honeypots to trace back amplification DDoS attacks. |
|
2021 |
RDF |
|
19 | Sérgio Moro, Pedro Ramos 0004, Joaquim Esmerado, Seyed Mohammad Jafar Jalali |
Can we trace back hotel online reviews' characteristics using gamification features? |
Int. J. Inf. Manag. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Tao Sun, Zhewei Wang, Charles D. Smith, Jundong Liu |
Trace-back Along Capsules and Its Application on Semantic Segmentation. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
19 | A. Umamaheswari, B. Kalaavathi |
Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model. |
Clust. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Israr Hussain, Wei Long Wu, He Qian Hua, Naeem Hussain |
Intra-Class Recognition of Fruits Using DCNN for Commercial Trace Back-System. |
ICMSSP |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Charikleia Papatsimpa, Jean-Paul M. G. Linnartz |
Trace-back Depth in Distributed Sensing HMM. |
PIMRC |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai |
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. |
IMIS |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Bojelo Esther Mooketsi |
Optimisation of Livestock Identification and Trace-back System LITS Database to meet Local Needs: Case Study of Botswana. |
J. Community Informatics |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Kazuhito Ito |
A Trace-Back Method with Source States for Viterbi Decoding of Rate-1/n Convolutional Codes. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Abdul Karimi Halim, M. H. Harun, S. Mohamed, Zulkifli Abdul Majid, M. A. Mansor, S. A. M. Al Junid |
Low Power Study on Trace Back and Reconstruction Modules for DNA Sequences Alignment Accelerator. |
UKSim |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Keyvan Kashkouli Nejad, Shawish Ahmed, Xiaohong Jiang 0001, Susumu Horiguchi |
Probabilistic proactive routing with active route trace-back for MANETs. |
Ad Hoc Networks |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Keyvan Kashkouli Nejad, Xiaohong Jiang 0001, Jianhua Ma |
Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada |
Early containment of worms using dummy addresses and connection trace back. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Weon Heum Park, Myung Hoon Sunwoo, Seong Keun Oh |
Efficient DSP Architecture for Viterbi Decoding with Small Trace Back Latency. |
IEICE Trans. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jeankyung Kim, Jinsoo Hwang, Byungryong Kim, Kichang Kim |
Proving Optimality of DWS(Distance-Weighted Sampling) Probability Function for FMS IP Trace-Back Technique. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Terence K. T. Law, John C. S. Lui, David K. Y. Yau |
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
attack traffic filtering, minimum stable time, DDoS attack, traceback |
19 | Cheng Zhan, Tughrul Arslan, Sami Khawam, Iain Lindsay |
Efficient implementation of trace-back unit in a reconfigurable Viterbi decoder fabric. |
ISCAS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Mihail Petrov, Tudor Murgan, Abdulfattah Mohammad Obeid, Cristian Chitu, Peter Zipf, Jörg Brakensiek, Manfred Glesner |
Dynamic power optimization of the trace-back process for the Viterbi algorithm. |
ISCAS (2) |
2004 |
DBLP BibTeX RDF |
|
19 | Mihail Petrov, Abdulfattah Mohammad Obeid, Tudor Murgan, Peter Zipf, Jörg Brakensiek, Bernard Ölkrug, Manfred Glesner |
An Adaptive Trace-Back Solution for State-Parallel Viterbi Decoders. |
VLSI-SOC |
2003 |
DBLP BibTeX RDF |
|
19 | Yingtao Jiang, Yiyan Tang, Yuke Wang, M. N. S. Swamy |
A trace-back-free Viterbi decoder using a new survival path management algorithm. |
ISCAS (1) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Jung-Gi Baek, Sang-Hun Yoon, Jong-Wha Chong |
Memory efficient pipelined Viterbi decoder with look-ahead trace back. |
ICECS |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Emmanuel Boutillon, Luis González |
Trace back techniques adapted to the surviving memory management in the M algorithm. |
ICASSP |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Mauro Pedrali, Rémi Bastide |
Can We Trace Back Cognitive Processes in Root Cause Analysis? |
HCI (2) |
1997 |
DBLP BibTeX RDF |
|
19 | Trieu-Kien Truong, Ming-Tang Shih, Irving S. Reed, Edgar H. Satorius |
A VLSI design for a trace-back Viterbi decoder. |
IEEE Trans. Commun. |
1992 |
DBLP DOI BibTeX RDF |
|
18 | Chang-Jin Choi, Sang-Hun Yoon, Jong-Wha Chong, Shouyin Liu |
A New Low-Power and High Speed Viterbi Decoder Architecture. |
ICUCT |
2006 |
DBLP DOI BibTeX RDF |
RE-exchange, low-power, look-ahead, viterbi |
18 | Peter A. Riocreux, L. E. M. Brackenbury, J. Mike Cumpstey, Stephen B. Furber |
A Low-Power Self-Timed Viterbi Decoder. |
ASYNC |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Lupin Chen, Jinjin He, Zhongfeng Wang 0001 |
Design of Low-Power Memory-Efficient Viterbi Decoder. |
SiPS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jae-Sun Han, Tae-Jin Kim, Chanho Lee |
High performance Viterbi decoder using modified register exchange methods. |
ISCAS (3) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato |
Tracing back attacks against encrypted protocols. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
encryption, intrusion detection system (IDS), traceback |
13 | Johannes Bohnet, Stefan Voigt, Jürgen Döllner |
Projecting code changes onto execution traces to support localization of recently introduced bugs. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
dynamic analysis, software visualization, fault localization |
13 | Denh Sy, Lichun Bao |
CAPTRA: coordinated packet traceback. |
IPSN |
2006 |
DBLP DOI BibTeX RDF |
packet traceback, wireless sensor networks, bloom filter |
13 | Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade |
InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati |
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | John Haggerty, Qi Shi 0001, Madjid Merabti |
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Jia Hou, Moon Ho Lee |
A Fast Search and Advanced Marking Scheme for Network IP Traceback Model. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Andrew P. Tolmach, Andrew W. Appel |
Debugging Standard ML Without Reverse Engineering. |
LISP and Functional Programming |
1990 |
DBLP DOI BibTeX RDF |
|
9 | Yun Li 0011, Jian Ren 0001 |
Providing Source-Location Privacy in Wireless Sensor Networks. |
WASA |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Chang-Keon Ryu, Hyong-Jun Kim, Hwan-Gue Cho |
A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
document evolution, plagiarism, spatio-temporal model |
9 | Eldad Haber, Stefan Heldmann, Jan Modersitzki |
A Scale-Space Approach to Landmark Constrained Image Registration. |
SSVM |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Manja Lohse, Marc Hanheide, Katharina J. Rohlfing, Gerhard Sagerer |
Systemic interaction analysis (SInA) in HRI. |
HRI |
2009 |
DBLP DOI BibTeX RDF |
follow behavior, user studies, autonomous system, analysis tools, domestic robot |
9 | Jean-Charles Pomerol, Frédéric Adam |
Understanding Human Decision Making - A Fundamental Step Towards Effective Intelligent Decision Support. |
Intelligent Decision Making: An AI-Based Approach |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Keen-Mun Yong, Gee-Swee Poo, Tee-Hiang Cheng |
Efficient Heuristic for Minimum Cost Trees Construction in Multi-Groups Multicast. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
Multi-groups, Minimum cost tree, Multicast, Shared-Tree |
9 | Ching-jung Lin, Jhong-Jyun Guo |
A Design Supporting System for Kimono Pattern Preservation. |
IV |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Minoru Kuribayashi, Naoyuki Akashi, Masakatu Morii |
On the systematic generation of Tardos's fingerprinting codes. |
MMSP |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Soon Hin Khor, Akihiro Nakao |
Overfort: Combating DDoS with peer-to-peer DDoS puzzle. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Jing-Ying Chang, Tzu-Heng Wang, Shao-Yi Chien, Liang-Gee Chen |
Spatial-temporal consistent labeling for multi-camera multi-object surveillance systems. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Jianbo Yao, Guangjun Wen |
Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh |
Wireless Forensic: A New Radio Frequency Based Locating System. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen |
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
collaborative forensics, VoIP services, SIP, traceback |
9 | Jie Jin, Chi-Ying Tsui |
Low-Power Limited-Search Parallel State Viterbi Decoder Implementation Based on Scarce State Transition. |
IEEE Trans. Very Large Scale Integr. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Ruiliang Chen, Jung-Min Park 0001, Randolph Marchany |
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
9 | André O. Castelucio, Ronaldo M. Salles, Artur Ziviani |
An AS-level IP traceback system. |
CoNEXT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Takeshi Shibuya, Shingo Shimada, Tomoki Hamagami |
Experimental study of the eligibility traces in complex valued reinforcement learning. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tom Djajadiningrat, Steven Kyffin |
Disintermediating the PC: a product centric view on Web 2.0. |
DPPI |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Yi Shi, Xinyu Yang, Ning Li, Yong Qi |
Deterministic Packet Marking with Link Signatures for IP Traceback. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Liang Zhang |
A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
sensor networks privacy, source-location privacy |
9 | Oyun-Erdene Namsrai, Kwang Su Jung, Sunshin Kim, Keun Ho Ryu |
RNA Secondary Structure Prediction with Simple Pseudoknots Based on Dynamic Programming. |
ICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Yuhong Guo, Yunhai Tong, Shiwei Tang, Dongqing Yang |
A FP-Tree-Based Method for Inverse Frequent Set Mining. |
BNCOD |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Bo Zheng, Chuang Lin 0002 |
AM-Trie: A High-Speed Parallel Packet Classification Algorithm for Network Processor. |
International Conference on Computational Science (4) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Jie Jin, Chi-Ying Tsui |
A low power Viterbi decoder implementation using scarce state transition and path pruning scheme for high throughput wireless applications. |
ISLPED |
2006 |
DBLP DOI BibTeX RDF |
low power, convolutional code, Viterbi algorithm |
9 | Bo Zheng, Chuang Lin 0002, Xuehai Peng |
AM-Trie: An OC-192 Parallel Multidimensional Packet Classification Algorithm. |
IMSCCS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Eric Q. Li, Cheng Xu, Tao Wang 0003, Li Jin, Yimin Zhang 0002 |
Parallel Linear Space Algorithm for Large-Scale Sequence Alignment. |
Euro-Par |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Luis Fernando González Pérez, Emmanuel Boutillon, Andrés David García García, Javier Eduardo González Villarruel, Reynaldo Félix Acuña |
VLSI Architecture for the M Algorithm Suited for Detection and Source Coding Applications. |
CONIELECOMP |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Martin Hepp, Frank Leymann, John Domingue, Alexander Wahler, Dieter Fensel |
Semantic Business Process Management: A Vision Towards Using Semantic Web Services for Business Process Management. |
ICEBE |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Sang-Ho Seo, Sin-Chong Park |
Low Latency and Power Efficient VD Using Register Exchanged State-Mapping Algorithm. |
IWSOC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Wei Ren, Hai Jin 0001 |
A Recursion Nearness Based Method for Characterizing IP Address. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Matei Ripeanu, Mic Bowman, Jeffrey S. Chase, Ian T. Foster, Milan Milenkovic |
Globus and PlanetLab Resource Management Solutions Compared. |
HPDC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Amit Purohit, Vishnu Navda, Tzi-cker Chiueh |
Tracing the Root of "Rootable" Processes. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Wan Ching Ho, Kerstin Dautenhahn, Chrystopher L. Nehaniv |
Comparing Different Control Architectures for Autobiographic Agents in Static Virtual Environments. |
IVA |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Russell E. Henning, Chaitali Chakrabarti |
Low-power approach for decoding convolutional codes with adaptive viterbi algorithm approximations. |
ISLPED |
2002 |
DBLP DOI BibTeX RDF |
adaptive T-algorithm decoding, low power, convolutional codes, viterbi algorithm |
9 | Jarernsri L. Mitrpanont, T. Plengpung |
DOWNSIZINGX : A Rule-Based System for Downsizing the Corporation's Computer Systems. |
IEA/AIE |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Zi-Chen Li, Jun-Mei Zhang, Jun Luo, William Song, Yi-Qi Dai |
Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers. |
ISEC |
2001 |
DBLP DOI BibTeX RDF |
Threshold digital signature, Information security, Traceable |
9 | Chi-Ming Chung, Ying-Hong Wang, Chih-Chieh Chuang |
Ad Hoc On-Demand Backup Node Setup Routing Protocol. |
ICOIN |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Sung-Min Lee 0006, Hyung-Woo Lee, Tai-Yun Kim |
A Secure Electronic Software Distribution (ESD) Protocol Based on PKC. |
EC-Web |
2000 |
DBLP DOI BibTeX RDF |
|
9 | Alessandra Nardi, Andrea Neviani, Carlo Guardiani |
Realistic Worst-Case Modeling by Performance Level Principal Component Analysis. |
ISQED |
2000 |
DBLP DOI BibTeX RDF |
|
9 | M. Kivioja, Jouni Isoaho, L. Vänskä |
Design and Implementation of Viterbi Decoder with FPGAs. |
J. VLSI Signal Process. |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #88 of 88 (100 per page; Change: )
|
|