Showing 1 - 20 results of 92 for search 'Mark Forward', query time: 0.06s Refine Results
  1. 1
  2. 2

    Study of a new packet marking scheme for DDoS attack source traceback by LI Jin-ming, WANG Ru-chuan

    Published 2005-01-01
    “…On the base of study of packet marking scheme’s convergence, a new method of choosing marking probability had been put forward to get the optimization of convergence. …”
    Get full text
    Article
  3. 3

    SDN security control and forwarding method based on cipher identification by Xi QIN, Guodong TANG, Chaowen CHANG

    Published 2018-02-01
    “…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
    Get full text
    Article
  4. 4

    Software-defined network packet forwarding verification scheme based on attribute-based signatures identification by Chaowen CHANG, Jianshu JIN, Peisheng HAN, Xianwei ZHU

    Published 2021-06-01
    “…Aiming at the lack of effective forwarding verification mechanism for packet in software defined network (SDN), a data packet forwarding verification scheme based on attributed-based signatures identification was proposed.First, the attribute signature identification was generated according to the user's identity attribute, and the data packet was marked by the attribute signature identification.Then, the P4 forwarding device was used to control accurately and sample the data packet.The controller verified the attribute signature of the sampled data packet.The OpenFlow forwarding device processes the abnormal data packets according to the flow table issued by the controller.Finally, a multi-controllers architecture was constructed to avoid the single point failure of the controller.The results of the experiment indicate that the scheme can achieve accurate control and sampling of data packet, effectively detect the forwarding abnormal behaviors such as packet tampering and forgery, and the network delay is within the range of feasible communication delay.…”
    Get full text
    Article
  5. 5

    Robust Range Estimation with a Monocular Camera for Vision-Based Forward Collision Warning System by Ki-Yeong Park, Sun-Young Hwang

    Published 2014-01-01
    “…The proposed method provides robust results even when road inclination varies continuously on hilly roads or lane markings are not seen on crowded roads. For experiments, a vision-based forward collision warning system has been implemented and the proposed method is evaluated with video clips recorded in highway and urban traffic environments. …”
    Get full text
    Article
  6. 6
  7. 7

    Low-budget equipment facilitating skid coefficient extraction for traffic accident analysis by Vinicius Lima, Umit Karabiyik, Felipe Kennedy, Igor Mello, Jorge Farias, Manoel Martins

    Published 2025-03-01
    “…Traffic accident reconstructionists play a vital role in providing reliable analyses to justice authorities by examining evidence at accident scenes. Skid marks, a critical form of evidence, are often used to calculate a vehicle's speed. …”
    Get full text
    Article
  8. 8

    Realization of Looking up Virtual Router's FIB Based on Set Partition by Ying Hu, Lei Zhuang

    Published 2014-10-01
    “…Various solutions were analyzed, and new method that to use mark bit solving the problem of inefficient looking up overlapping prefixes in SRAM, was proposed. …”
    Get full text
    Article
  9. 9

    Uncertainty-Aware Multimodal Trajectory Prediction via a Single Inference from a Single Model by Ho Suk, Shiho Kim

    Published 2025-01-01
    “…Evaluation on datasets collected by CARLA simulator demonstrates that our model not only outperforms Deep Ensembles-based multimodal trajectory prediction method in terms of accuracy such as minFDE and miss rate metrics but also offers enhanced time to react for collision avoidance scenarios. This research marks a step forward in integrating efficient uncertainty quantification into multimodal trajectory prediction tasks within resource-constrained autonomous driving platforms.…”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20