Login / Signup

Marking Technique to Isolate Boundary Router and Attacker.

Vaarun VijairaghavanDarshak ShahPallavi GalgaliAmit ShahNikhil ShahSrinivasan VenkateshLokesh Bhatia
Published in: Computer (2007)
Keyphrases
  • object boundaries
  • flow control
  • end to end
  • boundary estimation
  • data sets
  • neural network
  • shape description