Sciweavers

8888 search results - page 70 / 1778
» A New Peer-to-Peer Network
Sort
View
GI
2005
Springer
15 years 5 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
PAM
2005
Springer
15 years 5 months ago
New Methods for Passive Estimation of TCP Round-Trip Times
We propose two methods to passively measure and monitor changes in round-trip times (RTTs) throughout the lifetime of a TCP connection. Our first method associates data segments w...
Bryan Veal, Kang Li, David K. Lowenthal
MVA
1992
15 years 1 months ago
A New Parallel Scheme for Robust Segmentation of Textured Images
This paper proposes a parallel schemelalgorithm which is based on statistical analyses to fulfilthe robust segmentation of nature texture image. The whole scheme is constructed as...
Xudong Guan, Jian-qin Liu, Nanning Zheng
CMS
2010
118views Communications» more  CMS 2010»
15 years 2 days ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 3 days ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...