Sciweavers

8493 search results - page 182 / 1699
» Implementing a distributed firewall
Sort
View
134
Voted
WISTP
2010
Springer
15 years 1 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
PERCOM
2003
ACM
16 years 3 months ago
WLAN Location Determination via Clustering and Probability Distributions
We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, ...
Ashok K. Agrawala, A. Udaya Shankar
ICASSP
2009
IEEE
15 years 10 months ago
Robust and fast non asymmetric distributed source coding using turbo codes on the syndrome trellis
We consider the distributed compression of two (binary memoryless) correlated sources and propose a unique codec that can reach any point in the Slepian-Wolf region. In a previous...
Velotiaray Toto-Zarasoa, Aline Roumy, Christine Gu...
138
Voted
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 9 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
119
Voted
GECCO
2004
Springer
15 years 9 months ago
Finding Maximum Cliques with Distributed Ants
In this paper we describe an ant system algorithm (ASMC) for the problem of finding the maximum clique in a given graph. In the algorithm each ant has only local knowledge of the ...
Thang Nguyen Bui, Joseph R. Rizzo