Sciweavers

351 search results - page 21 / 71
» Building Secure and Reliable Network Applications
Sort
View
ICIP
2001
IEEE
16 years 3 months ago
Use of neural networks for behaviour understanding in railway transport monitoring applications
In the last years, the interest for advanced video-based surveillance applications is more and more growing. This is especially true in the field of railway urban transport where ...
Claudio Sacchi, Carlo S. Regazzoni, Gianluca Gera,...
CCS
2007
ACM
15 years 8 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru
CCS
2008
ACM
15 years 3 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
SCN
2008
Springer
147views Communications» more  SCN 2008»
15 years 1 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
PPNA
2008
137views more  PPNA 2008»
15 years 1 months ago
On peer-to-peer (P2P) content delivery
In both academia and industry, peer-to-peer (P2P) applications have attracted great attentions. P2P applications such as Napster, Gnutella, FastTrack, BitTorrent, Skype and PPLive,...
Jin Li