Sciweavers

708 search results - page 141 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
IPPS
1998
IEEE
13 years 9 months ago
Fault-Tolerant Message Routing for Multiprocessors
In this paper the problem of fault-tolerant message routing in two-dimensional meshes, with each inner node having 4 neighbors, is investigated. It is assumed that some nodes/links...
Lev Zakrevski, Mark G. Karpovsky
ANSS
2000
IEEE
13 years 9 months ago
Flow Control and Dynamic Load Balancing in Time Warp
We present, in this paper, an algorithm which integrates flow control and dynamic load balancing in Time Warp. The algorithm is intended for use in a distributed memory environme...
Myongsu Choe, Carl Tropper
COSIT
2001
Springer
142views GIS» more  COSIT 2001»
13 years 9 months ago
The Utility of Global Representations in a Cognitive Map
In this paper we propose the use of small global memory for a viewer’s immediate surroundings to assist in recognising places that have been visited previously. We call this glob...
Margaret E. Jefferies, Wai K. Yeap
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
MMS
1998
13 years 4 months ago
Packet Audio Playout Delay Adjustment: Performance Bounds and Algorithms
In packet audio applications, packets are buffered at a receiving site and their playout delayed in order to compensate for variable network delays. In this paper, we consider the ...
Sue B. Moon, James F. Kurose, Donald F. Towsley