Sciweavers

1286 search results - page 171 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
105
Voted
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 9 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 1 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 5 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
107
Voted
IMC
2006
ACM
15 years 6 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
CVPR
2000
IEEE
16 years 2 months ago
Real-Time Tracking of Non-Rigid Objects Using Mean Shift
A new method for real-time tracking of non-rigid objects seen from a moving camera is proposed. The central computational module is based on the mean shift iterations and nds the ...
Dorin Comaniciu, Visvanathan Ramesh, Peter Meer