Sciweavers

2503 search results - page 322 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2006
ACM
16 years 1 months ago
Meta Service Discovery
Meta service discovery is used to find and select a service discovery mechanism by context. As multiple service discovery mechanisms (SDM) proliferate across various administrativ...
John F. Buford, Alan Brown, Mario Kolberg
PET
2007
Springer
15 years 7 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
CP
2006
Springer
15 years 3 months ago
Graph Properties Based Filtering
Abstract. This report presents a generic filtering scheme, based on the graph description of global constraints. This description is defined by a network of binary constraints and ...
Nicolas Beldiceanu, Mats Carlsson, Sophie Demassey...
PDPTA
2003
15 years 3 months ago
Solipsis: A Massively Multi-Participant Virtual World
—This paper presents a massively shared virtual reality system based on a network of peers. It does not rely on any server nor on IP multicast, and intends to be scalable to an u...
Joaquín Keller, Gwendal Simon
ILP
2005
Springer
15 years 7 months ago
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops
Recursive loops in a logic program present a challenging problem to the PLP framework. On the one hand, they loop forever so that the PLP backward-chaining inferences would never s...
Yi-Dong Shen, Qiang Yang