Login / Signup
Marking Technique to Isolate Boundary Router and Attacker.
Vaarun Vijairaghavan
Darshak Shah
Pallavi Galgali
Amit Shah
Nikhil Shah
Srinivasan Venkatesh
Lokesh Bhatia
Published in:
Computer (2007)
Keyphrases
</>
object boundaries
flow control
end to end
boundary estimation
data sets
neural network
shape description