Sciweavers

2057 search results - page 72 / 412
» Distributed Secure Systems: Then and Now
Sort
View
RIVF
2007
15 years 2 months ago
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-...
Qing Xu 0006, M. B. C. Silva, Jean-Luc Danger, Syl...
ICRA
2010
IEEE
193views Robotics» more  ICRA 2010»
14 years 11 months ago
Model-based motion tracking system using distributed network cameras
— For a coexisting and collaborative society that incorporates humans and robots, the detection, tracking, and recognition of human motion are indispensable techniques for a robo...
Yumi Iwashita, Ryo Kurazume, Takamitsu Mori, Masak...
COMPSAC
2002
IEEE
15 years 6 months ago
Designing a Distributed Software Development Support System Using a Peer-to-Peer Architecture
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Seth Bowen, Frank Maurer
DBSEC
2007
106views Database» more  DBSEC 2007»
15 years 2 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 5 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw