Sciweavers

616 search results - page 102 / 124
» Forecasting presence and availability
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 3 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ESTIMEDIA
2007
Springer
15 years 3 months ago
Leveraging Predicated Execution for Multimedia Processing
—Modern compression standards such as H.264, DivX, or VC-1 provide astonishing quality at the costs of steadily increasing processing requirements. Therefore, efficient solution...
Dietmar Ebner, Florian Brandner, Andreas Krall
79
Voted
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 3 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
74
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Avoiding Oscillations Due to Intelligent Route Control Systems
Abstract— Intelligent Route Control (IRC) systems are increasingly deployed in multihomed networks. IRC systems aim to optimize the cost and performance of outgoing traffic, bas...
Ruomei Gao, Constantinos Dovrolis, Ellen W. Zegura
IMC
2005
ACM
15 years 3 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...