Back to Results
First PageMeta Content
Network performance / Transmission Control Protocol / Greedy algorithm / Audio watermark detection / Packet loss / Communications protocol / Data / Information / Computing


Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets∗ Pai Peng, Peng Ning, Douglas S. Reeves Xinyuan Wang Department of Computer Science
Add to Reading List

Document Date: 2011-11-09 13:26:15


Open Document

File Size: 151,13 KB

Share Result on Facebook

City

Active Timing / Oakland / /

Facility

Iowa State University / /

IndustryTerm

secure protocols / computing / connection chain / brute-force algorithm / /

MarketIndex

S&P 95 / /

Organization

Douglas S. Reeves Xinyuan Wang Department / Department of Computer Science / U.S. Government / George Mason University / NC State Univ. / Brute Force / Iowa State University / U.S. Securities and Exchange Commission / North Carolina State University Department of Information / /

Person

Yong Guan / U. Shankar / V / Douglas S. Reeves Xinyuan Wang / /

/

Position

watermark wb / computing wb / wb / /

ProvinceOrState

California / Iowa / /

Technology

encryption / overall Greedy+ algorithm / brute-force algorithm / packet encryption / Brute Force Algorithm / Overall Performance The Greedy+ algorithm / Greedy algorithm / using protocols / Greedy∗ algorithm / 4 algorithms / Greedy+ algorithm / /

URL

http /

SocialTag