Sciweavers

11121 search results - page 2077 / 2225
» Computing with Continuous Change
Sort
View
P2P
2007
IEEE
161views Communications» more  P2P 2007»
15 years 9 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer
146
Voted
ACIVS
2007
Springer
15 years 9 months ago
Spatiotemporal Fusion Framework for Multi-camera Face Orientation Analysis
In this paper, we propose a collaborative technique for face orientation estimation in smart camera networks. The proposed spatiotemporal feature fusion analysis is based on active...
Chung-Ching Chang, Hamid K. Aghajan
132
Voted
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 9 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena
134
Voted
CCS
2007
ACM
15 years 9 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
136
Voted
CCS
2007
ACM
15 years 9 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
« Prev « First page 2077 / 2225 Last » Next »