|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 570 occurrences of 414 keywords
|
|
|
Results
Found 1825 publication records. Showing 1825 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
97 | Steven J. Simske, Margaret Sturgill, Jason S. Aronoff |
Effect of copying and restoration on color barcode payload density. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Symposium on Document Engineering ![In: Proceedings of the 2009 ACM Symposium on Document Engineering, Munich, Germany, September 16-18, 2009, pp. 127-130, 2009, ACM, 978-1-60558-575-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3d bar codes, color compensation, color tiles, payload density, security printing, image restoration |
79 | Sayantan Choudhury, Irfan Sheriff, Jerry D. Gibson, Elizabeth M. Belding-Royer |
Effect of payload length variation and retransmissions on multimedia in 802.11a WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 377-382, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
payload adaptation, rate adaptation, retransmissions, multimedia transmission, IEEE 802.11a |
79 | Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon |
Payload attribution via hierarchical bloom filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 31-41, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ForNet, hierarchical bloom filters, payload attribution, security |
76 | Sunghyun Kim, Heejo Lee |
Reducing Payload Scans for Attack Signature Matching Using Rule Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 350-360, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein |
Highly efficient techniques for network forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 150-160, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
payload attribution, bloom filter, network forensics |
72 | Ahmed O. El-Rayis, Anatoly O. Melnyk |
Localized Payload Management Approach to Payload Control and Data Acquisition Architecture for Space Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHS ![In: Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), August 5-8, 2007, University of Edinburgh, Scotland, United Kingdom, pp. 263-272, 2007, IEEE Computer Society, 0-7695-2866-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Sayantan Choudhury, Jerry D. Gibson |
Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 2444-2448, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Hongfei Sui, Jianer Chen, Songqiao Chen, Jianxin Wang 0001 |
Payload analysis of anonymous communication system with host-based rerouting mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 1259-1264, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Jee-Hwan Ryu, Dong-Soo Kwon, Youngjin Park |
A Robust Controller Design Method for a Flexible Manipulator with a Large Time Varying Payload and Parameter Uncertainties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 27(4), pp. 345-361, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
descaling technique, descriptor form, payload variation, polytopic approach, robust control, flexible manipulator, parameter uncertainty |
58 | Sayantan Choudhury, Jerry D. Gibson |
Payload Length and Rate Adaptation for Multimedia Communications in Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 25(4), pp. 796-807, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Like Zhang, Gregory B. White |
Analysis of Payload Based Application level Network Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 99, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Roberto Perdisci, Guofei Gu, Wenke Lee |
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 488-498, 2006, IEEE Computer Society, 0-7695-2701-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Liang Lu, Jeffrey Horton, Reihaneh Safavi-Naini, Willy Susilo |
Transport Layer Identification of Skype Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 465-481, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Terence Kelly, Jeffrey C. Mogul |
Aliasing on the world wide web: prevalence and performance implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Eleventh International World Wide Web Conference, WWW 2002, May 7-11, 2002, Honolulu, Hawaii, USA, pp. 281-292, 2002, ACM, 1-58113-449-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
duplicate suppression, duplicate transfer detection, redundant transfers, resource modification, WWW, world wide web, performance analysis, caching, HTTP, aliasing, DTD, cache hierarchies, Zipf's law, hypertext transfer protocol |
49 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 274-291, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
48 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2007, Orlando, Florida, USA, December 3-4, 2007, pp. 127-136, 2007, ACM, 978-1-59593-945-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
48 | Ye-Kui Wang |
AVS-M: From Standards to Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 21(3), pp. 332-344, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AVS-M, RTP payload format, standard, video coding, file format |
44 | Katsuya Watabe, Tetsuya Saito, Nobutaka Matsumoto, Takuo Tanemura, Hideaki Imaizumi, Abdullah Al Amin, Mitsuru Takenaka, Yoshiaki Nakano, Hiroyuki Morikawa |
80Gb/s Multi-wavelength Optical Packet Switching Using PLZT Switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ONDM ![In: Optical Network Design and Modeling, 11th International IFIP TC6 Conference, ONDM 2007, Athens, Greece, May 29-31, 2007., pp. 11-20, 2007, Springer, 978-3-540-72729-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-wavelength, optical packet, PLZT switch, WDM |
44 | Thomas Karagiannis, Andre Broido, Michalis Faloutsos, Kimberly C. Claffy |
Transport layer identification of P2P traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 121-134, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
peer-to-peer, measurements, traffic classification |
44 | Michael Kontitsis, R. D. Garcia, Kimon P. Valavanis |
Design, Implementation and Testing of a Vision System for Small Unmanned Vertical Take off and Landing Vehicles with Strict Payload Limitations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 44(2), pp. 139-159, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
on-board processing, on-the-ground processing, payload limitations, vertical take off and landing, unmanned vehicles |
40 | Jun Ma, Guanzhong Dai, Jing Zhou |
Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 75-78, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Farhad Aghili |
Impedance control of manipulators carrying a heavy payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 3410-3415, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Chad D. Mano, Andrew Blaich, Qi Liao 0002, Yingxin Jiang, David A. Cieslak, David Salyers, Aaron Striegel |
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(2), pp. 2:1-2:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
rogue systems, network security, traffic conditioning |
40 | Andrew D. Ker |
Locating steganographic payload via ws residuals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 27-32, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
weighted stego-image, steganalysis, forensics |
40 | Hongmei Gou, Min Wu 0001 |
Improving Embedding Payload in Binary Imageswith "Super-Pixels". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 277-280, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Chin Pei Tang, Rajankumar Bhatt, Venkat Krovi |
Decentralized Kinematic Control of Payload by a System of Mobile Manipulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 2004 IEEE International Conference on Robotics and Automation, ICRA 2004, April 26 - May 1, 2004, New Orleans, LA, USA, pp. 2462-2467, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Ke Wang 0009, Salvatore J. Stolfo |
Anomalous Payload-Based Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 203-222, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Moussa Habib, Sami Sarhan, Lama Rajab |
A Robust-Fragile Dual Watermarking System in the DCT Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 548-553, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data payload (capacity), biometric signature, Discrete Cosine Transform (DCT), Fragile watermark, Spatial Domain, Robust watermark, Transform Domain |
39 | Thomas Schierl, Markus Kampmann, Thomas Wiegand |
H.264/AVC interleaving for 3G wireless video streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 868-871, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
retransmission buffer, H.264-AVC interleaving framework, 3G wireless video streaming, RTP payload format, NAL unit, block error rate, packet-switching, real-time transport protocol |
36 | Yier Jin, Yiorgos Makris |
Hardware Trojan Detection Using Path Delay Fingerprint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings, pp. 51-57, 2008, IEEE Computer Society, 978-1-4244-2401-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | William E. Singhose, Dooroo Kim |
Manipulation with Tower Cranes Exhibiting Double-Pendulum Oscillations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2007 IEEE International Conference on Robotics and Automation, ICRA 2007, 10-14 April 2007, Roma, Italy, pp. 4550-4555, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Md. Nurul Islam, Atsuhi Kara |
Throughput Analysis of SCTP over a Multi-homed Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 110, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data Chunk, Association Throughput, Transport Protocol, Stream Control Transmission Protocol, Multi-homing |
36 | James Moscola, Young H. Cho, John W. Lockwood |
Implementation of Network Application Layer Parser for Multiple TCP/IP Flows in Reconfigurable Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006, pp. 1-4, 2006, IEEE, 1-4244-0312-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(2), pp. 109-123, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
36 | Adam L. Young |
Building a Cryptovirus Using Microsoft's Cryptographic API. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 389-401, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 171-182, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Zhenxing Qian, Xinpeng Zhang 0001, Shuozhong Wang |
Matrix Selection in High Payload Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 328-331, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
matrix embedding, high payload, security, data hiding |
32 | Michele D. Carpenter, Mason A. Peck |
Dynamics of a High-Agility, Low-Power Imaging Payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Robotics ![In: IEEE Trans. Robotics 24(3), pp. 666-675, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Chin-Chen Chang 0001, The Duc Kieu, Yung-Chen Chou |
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 16-21, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | M. Abou-Samah, Chin Pei Tang, Rajankumar Bhatt, Venkat Krovi |
A kinematically compatible framework for cooperative payload transport by nonholonomic mobile manipulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Robots ![In: Auton. Robots 21(3), pp. 227-242, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Physical cooperation, Virtual prototyping, Mobile manipulator, Composite system, Hardware-in-the-loop, Redundancy resolution |
32 | Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo |
Anomalous Payload-Based Worm Detection and Signature Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 227-246, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Fang Hao, Murali S. Kodialam, T. V. Lakshman, Hui Zhang 0002 |
Fast payload-based flow estimation for traffic monitoring and network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2005 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2005, Princeton, New Jersey, USA, October 16-18, 2005, pp. 211-220, 2005, ACM, 1-59593-082-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
network security, traffic monitoring, traffic estimation |
32 | Mauro Marinelli, Riccardo Giubilei |
A Regenerative Payload for Satellite Multimedia Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Multim. ![In: IEEE Multim. 6(4), pp. 30-37, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Maurice Maes, Ton Kalker, Jaap Haitsma, Geert Depovere |
Exploiting Shift Invariance to Obtain a High Payload in Digital Image Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 1 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume I, pp. 7-12, 1999, IEEE Computer Society, 0-7695-0253-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
multimedia data security, digital watermarking |
32 | Vicente B. Feliu, José A. Somolinos, Carlos Cerrada, José Antonio Cerrada |
A New Control Scheme of Single-link Flexible Manipulators Robust to Payload Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 20(2-4), pp. 349-373, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
control of flexible arms, computer control, feedforward control, robot control, robust control |
30 | Elie Bursztein |
Probabilistic Identification for Hard to Classify Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, pp. 49-63, 2008, Springer, 978-3-540-79965-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
payload analysis, header discriminator, p2p, traffic classification |
30 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2006, San Jose, California, USA, December 3-5, 2006, pp. 163-172, 2006, ACM, 1-59593-580-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
30 | Sang-Ho Lee, Chong-Won Lee |
Hybrid Control Scheme for Robust Tracking of Two-Link Flexible Manipulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 34(4), pp. 431-452, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
hybrid control scheme, two-link flexible manipulator, flexible vibrations, hybrid trajectories, virtual control force, robust tracking control, composite control scheme, payload uncertainty, variable structure control |
30 | Sang-Ho Lee, Chong-Won Lee |
Hybrid Control Scheme for Robust Tracking of Two-Link Flexible Manipulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 32(4), pp. 389-410, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
hybrid control scheme, two-link flexible manipulator, flexible vibrations, hybrid trajectories, virtual control force, robust tracking control, composite control scheme, payload uncertainty, variable structure control |
30 | Ahmed Mehaoua, Raouf Boutaba, Guy Pujolle |
An adaptive and selective cell drop policy with dynamic data partitioning for best effort video over ATM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pp. 519-528, 1997, IEEE Computer Society, 0-8186-8141-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
selective cell drop policy, dynamic data partitioning, best effort video, ATM best effort services, MPEG based video delivery framework, unspecified bit rate, video oriented cell discarding scheme, switch buffer occupancy, video cell payload types, dynamic frame level priority data partition mechanism, MPEG data structure, enhanced ATM Adaptation Layer type 5, slice based MPEG2 encapsulation strategy, video delivery framework, real MPEG video data, asynchronous transfer mode, available bit rate |
28 | Mangang Xie, Baozhen An, Changhao Song, Qianqian Wang, Meng Zhou, Xiangdong Jia |
Updating Not Just Payload but Payload and Extra Data Simultaneously in Real-Time IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-Taiwan ![In: International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023, PingTung, Taiwan, July 17-19, 2023, pp. 385-386, 2023, IEEE, 979-8-3503-2417-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Yunfan Ren, Jianheng Liu, Haoyao Chen, Yunhui Liu |
Vision-encoder-based Payload State Estimation for Autonomous MAV With a Suspended Payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2021, Prague, Czech Republic, September 27 - Oct. 1, 2021, pp. 9632-9638, 2021, IEEE, 978-1-6654-1714-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Taketo Sugaya, Toshiyuki Murakami |
Velocity and Attitude Control of Quadcopter with Suspended-payload using Disturbance Observer with Payload Inclination Suppression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMC ![In: 17th IEEE International Conference on Advanced Motion Control, AMC 2021, Padova, Italy, February 18-20, 2022, pp. 414-419, 2021, IEEE, 978-1-7281-7711-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Joan Francesc Muñoz-Martín, Lara Fernández, Joan Adrià Ruiz De Azua, Adriano Camps |
The Flexible Microwave Payload -2: Architecture and Testing of a Combined GNSS-R and L-Band Radiometer With RFI Mitigation Payload For Cubesat-Based Earth Observation Missions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: 2019 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2019, Yokohama, Japan, July 28 - August 2, 2019, pp. 5185-5188, 2019, IEEE, 978-1-5386-9154-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Mohsen Kakavand, Norwati Mustapha, Aida Mustapha, Mohd Taufik Abdullah |
Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 10(8), pp. 3884-3910, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jian-Shiang Chen, Chia-Hsiang Menq |
Experiments on the payload-adaptation of a flexible one-link manipulation with unknown payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 1990 IEEE International Conference on Robotics and Automation, Cincinnati, Ohio, USA, May 13-18, 1990, pp. 1614-1619, 1990, IEEE, 0-8186-9061-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
27 | Muhammad Ali Akbar, Muddassar Farooq |
RTP-miner: a real-time security framework for RTP fuzzing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 20th International Workshop, NOSSDAV 2010, Amsterdam, The Netherlands, June 2-4, 2010, Proceedings, pp. 87-92, 2010, ACM, 978-1-4503-0043-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fuzzing attacks, machine learning, denial of service, stochastic models, real-time transport protocol, voip |
27 | Yongjian Hu, Heung-Kyu Lee, Jianwei Li |
DE-Based Reversible Data Hiding With Improved Overflow Location Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 19(2), pp. 250-260, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Guorong Xuan, Yun Q. Shi 0001, Peiqi Chai, Jianzhong Teng, Zhicheng Ni, Xuefeng Tong |
Optimum Histogram Pair Based Image Lossless Data Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security IV, pp. 84-102, 2009, Springer, 978-3-642-01756-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
optimum histogram pair, reversible (lossless) data embedding, selection of best threshold, adaptive histogram modification, selection of suitable embedding region, integer wavelets |
27 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 16-21, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris |
Hardware implementation for network intrusion detection rules with regular expression support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1535-1539, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, FPGAs, intrusion detection, network intrusion detection system |
27 | Alvaro Luis, Miguel A. Patricio |
Scalable Streaming of JPEG 2000 Live Video Using RTP over UDP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCAI ![In: International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008, University of Salamanca, Spain, 22th-24th October 2008, pp. 574-581, 2008, Springer, 978-3-540-85862-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Guorong Xuan, Yun Q. Shi 0001, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong |
Optimum Histogram Pair Based Image Lossless Data Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 264-278, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Optimum histogram pair, lossless data embedding, selection of best threshold, adaptive histogram modification, selection of suitable embedding region, integer wavelets |
27 | Yingqiu Liu, Wei Li 0125, Yunchun Li |
Network Traffic Classification Using K-means Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 360-365, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Chun-Ming Leung, Yuen-Yan Chan |
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 18-20 June 2007, Paris, France, pp. 401-408, 2007, IEEE Computer Society, 0-7695-2879-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Enterprise Network Security, Network Foren- sics, Traffic Prioritiza- tion, Reverse Engineering, Blocking, Traffic Analysis, Skype, NAT Traversal |
27 | Yongjian Hu, Byeungwoo Jeon |
Reversible Visible Watermarking and Lossless Recovery of Original Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 16(11), pp. 1423-1429, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Conor James Walsh, Kenneth Pasch, Hugh M. Herr |
An autonomous, underactuated exoskeleton for load-carrying augmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2006, October 9-15, 2006, Beijing, China, pp. 1410-1415, 2006, IEEE, 1-4244-0258-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mong-Fong Horng, Chun-Wei Chen, Chin-Shun Chuang, Cheng-Yu Lin |
Identification and Analysis of P2P Traffic- An Example of BitTorrent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 266-269, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi 0001, Zhicheng Ni |
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 323-332, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Histogram Shifting, Lossless Data Hiding, Integer Wavelets |
27 | Dimitris Tsiokos, Efstratios Kehayas, Paraskevas Bakopoulos, Dimitrios Apostolopoulos, Dimitrios Petrantonakis, Nikos Pleros, Hercules Avramopoulos |
All-Optical Signal Processing Using Integrated Mach Zehnder Interferometric Switches for 40 Gb/s All-Optical Label-Swapped Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS 2006), 1-5 October 2006, San José, California, USA, 2006, IEEE, 978-1-4244-0425-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | En Cheng, Hai Jin 0001, Zongfen Han, Jianhua Sun 0002 |
Network-Based Anomaly Detection Using an Elman Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 471-480, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Benjamin Lok, Samir Naik, Mary C. Whitton, Frederick P. Brooks Jr. |
Incorporating dynamic real objects into immersive virtual environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SI3D ![In: Proceedings of the 2003 Symposium on Interactive 3D Graphics, SI3D 2003, Monterey, California, USA, April 28-30, 2003, pp. 31-40, 2003, ACM, 1-58113-645-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
interactions in virtual environments, mixed reality, collision detection |
27 | Sung-Ho Ahn, Min-Gyu Kang, Doo-Hyun Kim, Hyung Chul Kim |
QoS Adaptive MPEG-2 Streaming Based on Scalable Media Object Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: The 15th International Conference on Information Networking, ICOIN 2001, Beppu City, Oita, Japan, January 31 - February 2, 2001, pp. 683-688, 2001, IEEE Computer Society, 0-7695-0951-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | A. M. Shahri, B. J. Evans, Fazel Naghdy |
Neuro-fuzzy adaptive torque control of a SCARA robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANZIIS ![In: Proceedings of the Australian New Zealand Conference on Intelligent Information Systems, ANZIIS 96, Adelaide, South Australia, 18-20 November 1996, pp. 241-244, 1996, IEEE, 0-7803-3667-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Fangqi Sun, Liang Xu, Zhendong Su 0001 |
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 539-554, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cross-site scripting worm, client-side detection, Web application security |
23 | Fulvio Risso, Mario Baldi, Olivier Morandi, Andrea Baldini, Pere Monclus |
Lightweight, Payload-Based Traffic Classification: An Experimental Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 5869-5875, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Raymond J. Jayabal, Chiew Tong Lau |
A Payload-Dropping CSMA/CA Protocol for Improving Spatial Reuse of Wireless Local and Personal Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 1622-1627, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto |
Network Application Identification Using Transition Pattern of Payload Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 2633-2638, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | M. Patrick Collins, Michael K. Reiter |
On the Limits of Payload-Oblivious Network Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 251-270, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network intrusion detection, ROC curve |
23 | Sasa Mrdovic, Branislava Perunicic |
NIDS based on payload word frequencies and anomaly of transitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 334-339, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Nnamdi Nwanze, Douglas Summerville |
Detection of anomalous network packets using lightweight stateless payload inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 911-918, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Peng Zhang, Yuan-chuan Li |
Simulations and Trajectory Tracking of Two Manipulators Manipulating a Flexible Payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAM ![In: 2008 IEEE Conference on Robotics, Automation and Mechatronics, RAM 2008, 21-24 September 2008, Chengdu, China, pp. 72-77, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Yi Chen 0020, Matthew P. Cartmell |
Multi-objective optimisation on motorised momentum exchange tether for payload orbital transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore, pp. 987-993, 2007, IEEE, 978-1-4244-1339-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Aminian, Mohammad K. Akbari, Bahman Javadi |
Coordinated checkpoint from message payload in pessimistic sender-based message logging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Huanbao Wang, Yousheng Zhang, Yuan Li |
Modeling for Security Verification of a Cryptographic Protocol with MAC Payload. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 538-547, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Alessio Salerno, Jorge Angeles |
The Control of Semi-autonomous Two-wheeled Robots undergoing large Payload-variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 2004 IEEE International Conference on Robotics and Automation, ICRA 2004, April 26 - May 1, 2004, New Orleans, LA, USA, pp. 1740-1745, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Steve Carr 0001, Philip H. Sweany |
Automatic data partitioning for the agere payload plus network processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2004 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2004, Washington DC, USA, September 22 - 25, 2004, pp. 238-247, 2004, ACM, 1-58113-890-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
scheduling, partitioning, network processors |
23 | Taeshik Shon, Jongsub Moon, Sangjin Lee 0002, Dong Hoon Lee 0001, Jongin Lim 0001 |
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 828-835, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Kimon P. Valavanis, C. A. Jacobson, B. H. Gold |
Integration control and failure detection with application to the robot payload variation problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 4(2), pp. 145-173, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
Four parameter controller, failure and diagnostic system, diagnostic capability, disturbance monitor, doubly coprime fractional representation, proportional and derivative controller |
21 | Aruna Jamdagni, Zhiyuan Tan 0001, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu |
Intrusion detection using GSAD model for HTTP traffic on web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1193-1197, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
GSAD model, intrusion detection, attack, HTTP, payload |
21 | Noboru Harada, Yutaka Kamamoto, Takehiro Moriya |
Lossless Compression of Mapped Domain Linear Prediction Residual for ITU-T Recommendation G.711.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCC ![In: 2010 Data Compression Conference (DCC 2010), 24-26 March 2010, Snowbird, UT, USA, pp. 532, 2010, IEEE Computer Society, 978-0-7695-3994-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ITU-T Recommendation G.711.0, Lossless compression of G.711 payload, Plus-Minus zero mapping, Escaped-Huffman coding, Adaptive recursive Rice coding, Mapped domain linear predictive coding, Standardization, Speech coding |
21 | Jihah Nah, JongWeon Kim, Jaeseok Kim |
A New Image Watermarking Using Peak Position Modulation for ID Photos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: 11th IEEE International Symposium on Multimedia, ISM 2009, San Diego, California, USA, December 14-16, 2009, pp. 595-599, 2009, IEEE Computer Society, 978-0-7695-3890-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ID forgery detection, Peak Position Modulation, Robustness, Watermarking, Spread Spectrum, Payload |
21 | Jihah Nah, JongWeon Kim, Jaeseok Kim |
A new robust forensic marking using peak position modulation for video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 784-789, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
peak position modulation, video forensic marking, robustness, spread spectrum, 3D wavelet transform, payload |
21 | Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris |
Reverse Engineering: EDOWA Worm Analysis and Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Congress on Engineering (Selected Papers) ![In: Advances in Electrical Engineering and Computational Science, [revised and extended papers from the World Congress on Engineering, WCE 2008, London, UK, July 2-4, 2008], pp. 277-288, 2008, Springer, 978-90-481-2310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
worm analysis, worm classification, Classification, payload |
21 | Peter Teufl, Udo Payer, Michael Amling, Martin Godec, Stefan Ruff, Gerhard Scheikl, Gernot Walzl |
InFeCT - Network Traffic Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 439-444, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network traffic classification, payload histogram, machine learning, feature extraction, tool, open source, policy verification |
21 | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai |
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 24-26 April 2008, Busan, Korea, pp. 485-489, 2008, IEEE Computer Society, 978-0-7695-3134-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Polymorphic Worm Detection, Abstract Payload Execution |
21 | Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee 0001 |
Countering Security Information Overload through Alert and Packet Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 26(2), pp. 60-70, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
alert visualization, payload visualization, packet visualization, log visualization, network visualization |
21 | Madihah Saudi, Nazean Jomhari |
Knowledge Structure on Virus for User Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 817-823, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
user education, mechanism trigger, operating algorithm, virus type, propagation, virus, severity, symptom, payload |
21 | Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen |
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 10, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
binary object visualization, payload visualization, binary navigation, packet visualization, reverse engineering, network visualization |
21 | Gerald Kühne, Christoph Kuhmünch |
Transmitting MPEG-4 video streams over the Internet: problems and solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia (2) ![In: Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30 - November 5, 1999, Part 2., pp. 135-138, 1999, ACM, 1-58113-239-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
RTP payload, video on demand, MPEG-4, real-time transport protocol |
Displaying result #1 - #100 of 1825 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|