Sciweavers

2097 search results - page 379 / 420
» Knowledge Base Maintenance through Knowledge Representation
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 6 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
ICASSP
2011
IEEE
14 years 3 months ago
A novel study and analysis on segmental gait sequence recognition
This paper presents a novel study and analysis on two important problems in gait recognition: one is how to perform gait recognition with only segment of a complete gait cycle for...
Nini Liu, Yap-Peng Tan
INFOCOM
2011
IEEE
14 years 3 months ago
iLight: Indoor device-free passive tracking using wireless sensor networks
—Target tracking is a main application of wireless sensor networks (WSNs), and has been studied widely [4], [10]. In this work, we study indoor passive tracking problem using WSN...
XuFei Mao, ShaoJie Tang, XiaoHua Xu, Xiang-Yang Li...
INFOCOM
2012
IEEE
13 years 2 months ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya

Publication
402views
16 years 10 months ago
Geometric Broadcast Protocol for Heterogeneous Wireless Networks
We present Geometric Broadcast for Heterogeneous Sensor Networks (GBS), a novel broad- casting protocol for heterogeneous wireless sensor and actor networks. While broadcasting is ...
V. Paruchuri, A. Durresi, Raj Jain