Sciweavers

3108 search results - page 504 / 622
» An Approach to Incremental Design of Distributed Embedded Sy...
Sort
View
MM
2004
ACM
124views Multimedia» more  MM 2004»
15 years 10 months ago
Exploiting content-based networking for video streaming
This technical demonstration shows that content-based networking is a promising technology for multireceiver video streaming. Each video receiver is provided with fine grained se...
Viktor S. Wold Eide, Frank Eliassen, Jørgen...
ASIACRYPT
2001
Springer
15 years 10 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
MOBIHOC
2003
ACM
16 years 5 months ago
Connected sensor cover: self-organization of sensor networks for efficient query execution
Spatial query execution is an essential functionality of a sensor network, where a query gathers sensor data within a specific geographic region. Redundancy within a sensor networ...
Himanshu Gupta, Samir R. Das, Quinyi Gu
COMCOM
2006
138views more  COMCOM 2006»
15 years 5 months ago
Reducing memory fragmentation in network applications with dynamic memory allocators optimized for performance
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...
CCS
2009
ACM
16 years 6 days ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...