Sciweavers

4581 search results - page 851 / 917
» Computing Transformation Semigroups
Sort
View
SAC
2009
ACM
15 years 6 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
DSN
2009
IEEE
15 years 6 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang
HAPTICS
2009
IEEE
15 years 6 months ago
Remote dynamic proxies for wave-based peer-to-peer haptic interaction
This paper introduces a distributed haptic control architecture that can render direct interaction between users in addition to cooperative manipulation of virtual objects. The pr...
Zhi Li, Daniela Constantinescu
SIBGRAPI
2009
IEEE
15 years 6 months ago
Detecting Buildings in Historical Photographs Using Bag-of-Keypoints
—The strategies for the preservation of historical documents can include their digitization, which is an effective way to make them publicly available while preventing degradatio...
Natalia C. Batista, Ana Paula Brandão Lopes...
ICPPW
2009
IEEE
15 years 6 months ago
Dynamic Control and Resource Allocation in Wireless-Infrastructured Distributed Cellular Networks with OFDMA
—In this paper, we consider joint optimization of end-to-end data transmission and resource allocation for Wireless-Infrastructured Distributed Cellular Networks (WIDCNs), where ...
Lei You, Ping Wu, Mei Song, Junde Song, Yong Zhang