Sciweavers

1773 search results - page 234 / 355
» A new partitioning scheme for improvement of image computati...
Sort
View
SASO
2008
IEEE
15 years 8 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
WCNC
2008
IEEE
15 years 8 months ago
Neighbor-Aware Adaptive Retry Limit for IEEE 802.11-Based Mobile Ad Hoc Networks
— In a mobile ad hoc network (MANET), it has been addressed that packet losses due to collision are often misinterpreted as routing failures, and cause unnecessary overhead for r...
Sehoon Kim, Jinkyu Lee, Ikjun Yeom
VTC
2006
IEEE
101views Communications» more  VTC 2006»
15 years 7 months ago
A Virtual Slot Multiple Access for IEEE 802.15.3 High-Rate Wireless Personal Area Networks
—The IEEE 802.15.3 has introduced a type of time division multiple access (TDMA) which allocates the variable length of timeslot within a constant time interval. However, it need...
Do-Youn Hwang, Eui Hyeok Kwon, Jae-Sung Lim
ICN
2005
Springer
15 years 7 months ago
AIMD Penalty Shaper to Enforce Assured Service for TCP Flows
Abstract. Many studies explored the guaranteed TCP throughput problem in DiffServ networks. Several new marking schemes have been proposed in order to solve this problem. Even if ...
Emmanuel Lochin, Pascal Anelli, Serge Fdida
ESORICS
2006
Springer
15 years 5 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea