Sciweavers

1170 search results - page 89 / 234
» Between ends and fibers
Sort
View
CN
2010
107views more  CN 2010»
14 years 10 months ago
Secure multicast in IPTV services
Technological evolution is leading telecommunications to all-IP networks where multiple services are transported as IP packets. Among these are the group communications services w...
António Pinto, Manuel Ricardo
USS
2010
14 years 9 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
IFIP
2009
Springer
14 years 9 months ago
On the Automated Correction of Protocols with Improper Message Encoding
Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
Dieter Hutter, Raul Monroy
TCSV
2010
14 years 6 months ago
Distributed Media-Aware Rate Allocation for Wireless Video Streaming
This paper addresses the rate allocation problem for wireless video streaming. Results from a simple subjective viewing test indicate that perceptually preferred allocation can be...
Xiaoqing Zhu, Bernd Girod
FOSSACS
2011
Springer
14 years 3 months ago
Irrelevance in Type Theory with a Heterogeneous Equality Judgement
Dependently typed programs contain an excessive amount of static terms which are necessary to please the type checker but irrelevant for computation. To obtain reasonable performan...
Andreas Abel