Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates
We propose a space-time Markov random field (MRF) model to detect abnormal activities in
video. The nodes in the MRF graph correspond to a grid of local regions in the video frames …
video. The nodes in the MRF graph correspond to a grid of local regions in the video frames …
Comprehensive survey of IPv6 transition technologies: A subjective classification for security analysis
G Lencse, Y Kadobayashi - IEICE Transactions on …, 2019 - search.ieice.org
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became
inevitable. However, this ongoing transition is taking a long time, and the two incompatible …
inevitable. However, this ongoing transition is taking a long time, and the two incompatible …
Exploiting loop-level parallelism on coarse-grained reconfigurable architectures using modulo scheduling
B Mei, S Vernalde, D Verkest, H De Man… - … -Computers and Digital …, 2003 - IET
Coarse-grained reconfigurable architectures have become increasingly important in recent
years. Automatic design or compilation tools are essential to their success. A modulo …
years. Automatic design or compilation tools are essential to their success. A modulo …
Network address translation: Extending the internet address space
D Wing - IEEE internet computing, 2010 - ieeexplore.ieee.org
Network Address Translation (NAT) and Network Address and Port Translation (NAPT) are
widely used to separate networks and share IPv4 addresses. They're valuable tools for …
widely used to separate networks and share IPv4 addresses. They're valuable tools for …
[HTML][HTML] Interactive connectivity establishment (ICE): A protocol for network address translator (NAT) traversal
A Keranen, C Holmberg, J Rosenberg - 2018 - rfc-editor.org
RFC 8445: Interactive Connectivity Establishment (ICE): A Protocol for Network Address
Translator (NAT) Traversal [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] …
Translator (NAT) Traversal [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] …
Beyond counting: new perspectives on the active IPv4 address space
In this study, we report on techniques and analyses that enable us to capture Internet-wide
activity at individual IP address-level granularity by relying on server logs of a large …
activity at individual IP address-level granularity by relying on server logs of a large …
{IPv6} security: Attacks and countermeasures in a nutshell
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …
Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network
This paper studies a problem for seamless migration of legacy networks of Internet service
providers to a software‐defined networking (SDN)‐based architecture along with the …
providers to a software‐defined networking (SDN)‐based architecture along with the …
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64
G Lencse, Y Kadobayashi - Computers & Security, 2018 - Elsevier
We are faced with the transition from IPv4 to IPv6, which will last for several years or possibly
decades. There are different IPv6 transition technologies, which enable the communication …
decades. There are different IPv6 transition technologies, which enable the communication …
[PDF][PDF] Performance evaluation of IPv4/IPv6 transition mechanisms for real-time applications using OPNET modeler
The problem of the potential depletion of IPv4 addresses has given rise to the development
of a new version of the Internet Protocol named IPv6. This version of the protocol offers many …
of a new version of the Internet Protocol named IPv6. This version of the protocol offers many …