Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates

J Kim, K Grauman - 2009 IEEE conference on computer vision …, 2009 - ieeexplore.ieee.org
We propose a space-time Markov random field (MRF) model to detect abnormal activities in
video. The nodes in the MRF graph correspond to a grid of local regions in the video frames …

Comprehensive survey of IPv6 transition technologies: A subjective classification for security analysis

G Lencse, Y Kadobayashi - IEICE Transactions on …, 2019 - search.ieice.org
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became
inevitable. However, this ongoing transition is taking a long time, and the two incompatible …

Exploiting loop-level parallelism on coarse-grained reconfigurable architectures using modulo scheduling

B Mei, S Vernalde, D Verkest, H De Man… - … -Computers and Digital …, 2003 - IET
Coarse-grained reconfigurable architectures have become increasingly important in recent
years. Automatic design or compilation tools are essential to their success. A modulo …

Network address translation: Extending the internet address space

D Wing - IEEE internet computing, 2010 - ieeexplore.ieee.org
Network Address Translation (NAT) and Network Address and Port Translation (NAPT) are
widely used to separate networks and share IPv4 addresses. They're valuable tools for …

[HTML][HTML] Interactive connectivity establishment (ICE): A protocol for network address translator (NAT) traversal

A Keranen, C Holmberg, J Rosenberg - 2018 - rfc-editor.org
RFC 8445: Interactive Connectivity Establishment (ICE): A Protocol for Network Address
Translator (NAT) Traversal [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] …

Beyond counting: new perspectives on the active IPv4 address space

P Richter, G Smaragdakis, D Plonka… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this study, we report on techniques and analyses that enable us to capture Internet-wide
activity at individual IP address-level granularity by relying on server logs of a large …

{IPv6} security: Attacks and countermeasures in a nutshell

J Ullrich, K Krombholz, H Hobel, A Dabrowski… - 8th USENIX Workshop …, 2014 - usenix.org
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …

Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network

BR Dawadi, DB Rawat, SR Joshi… - … Journal of Network …, 2021 - Wiley Online Library
This paper studies a problem for seamless migration of legacy networks of Internet service
providers to a software‐defined networking (SDN)‐based architecture along with the …

Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64

G Lencse, Y Kadobayashi - Computers & Security, 2018 - Elsevier
We are faced with the transition from IPv4 to IPv6, which will last for several years or possibly
decades. There are different IPv6 transition technologies, which enable the communication …

[PDF][PDF] Performance evaluation of IPv4/IPv6 transition mechanisms for real-time applications using OPNET modeler

K El Khadiri, O Labouidya, N Elkamoun… - International Journal of …, 2018 - researchgate.net
The problem of the potential depletion of IPv4 addresses has given rise to the development
of a new version of the Internet Protocol named IPv6. This version of the protocol offers many …