Sciweavers

2200 search results - page 386 / 440
» Hop Integrity in Computer Networks
Sort
View
VISSYM
2007
15 years 5 months ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas
DAC
2005
ACM
15 years 5 months ago
Minimizing peak current via opposite-phase clock tree
Although a lot of research efforts have been made in the minimization of the total power consumption caused by the clock tree, no attention has been paid to the minimization of th...
Yow-Tyng Nieh, Shih-Hsu Huang, Sheng-Yu Hsu
CVPR
2008
IEEE
15 years 4 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
EUC
2008
Springer
15 years 4 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
ECSCW
1993
15 years 4 months ago
Culture and Control in a Media Space
: Media spaces integrate audio, video and computer networking technology in order to provide a rich communicative environment for collaboration. The connectivity which they provide...
Paul Dourish