Sciweavers

8493 search results - page 375 / 1699
» Implementing a distributed firewall
Sort
View
SECON
2010
IEEE
15 years 2 months ago
Distributed Routing, Relay Selection, and Spectrum Allocation in Cognitive and Cooperative Ad Hoc Networks
Throughput maximization is a key challenge in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hopby-hop. To ach...
Lei Ding, Tommaso Melodia, Stella N. Batalama, Joh...
DAC
2009
ACM
15 years 2 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
GRAPHICSINTERFACE
2009
15 years 2 months ago
An analytical approach to single scattering for anisotropic media and light distributions
Despite their numerous applications, efficiently rendering participating media remains a challenging task due to the intricacy of the radiative transport equation. While numerical...
Vincent Pegoraro, Mathias Schott, Steven G. Parker
ICMCS
2009
IEEE
138views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Multi-rate peer-to-peer video conferencing: A distributed approach using scalable coding
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, sc...
Miroslav Ponec, Sudipta Sengupta, Minghua Chen, Ji...
AISS
2010
119views more  AISS 2010»
15 years 2 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo