Sciweavers

828 search results - page 164 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
CONEXT
2009
ACM
15 years 20 days ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...
NOSSDAV
2009
Springer
15 years 6 months ago
Overlay monitoring and repair in swarm-based peer-to-peer streaming
In Swarm-based Peer-to-Peer Streaming (SPS) mechanisms, participating peers form a randomly connected mesh over which they incorporate swarm-like content delivery. In practice, a ...
Nazanin Magharei, Reza Rejaie
CCS
2006
ACM
15 years 3 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
AFRIGRAPH
2001
ACM
15 years 3 months ago
Expressive textures
If a moving image is more expressive than words or than a still image, then an animated facial expression can explain more in depth the feelings of a virtual character. Facial ani...
K. Fei
EUROIMSA
2006
166views Multimedia» more  EUROIMSA 2006»
15 years 29 days ago
Advanced Multimedia Management - Control Model and Content Adaptation
The delivery and adaptation of multimedia content in distributed and heterogeneous environments requires flexible control and management mechanisms in terminals and in control ent...
Teodora Guenkova-Luy, Andreas Schorr, Franz J. Hau...