Sciweavers

1166 search results - page 101 / 234
» Adaptively Secure Broadcast
Sort
View
IFIP
2007
Springer
15 years 6 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
117
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
126
Voted
ECCV
2008
Springer
16 years 2 months ago
Edge-Preserving Smoothing and Mean-Shift Segmentation of Video Streams
Video streams are ubiquitous in applications such as surveillance, games, and live broadcast. Processing and analyzing these data is challenging because algorithms have to be effic...
Sylvain Paris
PERCOM
2006
ACM
16 years 7 days ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier
116
Voted
PERCOM
2005
ACM
16 years 7 days ago
MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints
We present the design goals and functional components of MASTAQ, a data management middleware for pervasive applications that utilize sensor data. MASTAQ allows applications to sp...
Inseok Hwang, Qi Han, Archan Misra