Sciweavers

2097 search results - page 379 / 420
» Knowledge Base Maintenance through Knowledge Representation
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 4 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
ICASSP
2011
IEEE
14 years 1 months ago
A novel study and analysis on segmental gait sequence recognition
This paper presents a novel study and analysis on two important problems in gait recognition: one is how to perform gait recognition with only segment of a complete gait cycle for...
Nini Liu, Yap-Peng Tan
INFOCOM
2011
IEEE
14 years 1 months ago
iLight: Indoor device-free passive tracking using wireless sensor networks
—Target tracking is a main application of wireless sensor networks (WSNs), and has been studied widely [4], [10]. In this work, we study indoor passive tracking problem using WSN...
XuFei Mao, ShaoJie Tang, XiaoHua Xu, Xiang-Yang Li...
INFOCOM
2012
IEEE
13 years 5 days ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya

Publication
402views
16 years 8 months ago
Geometric Broadcast Protocol for Heterogeneous Wireless Networks
We present Geometric Broadcast for Heterogeneous Sensor Networks (GBS), a novel broad- casting protocol for heterogeneous wireless sensor and actor networks. While broadcasting is ...
V. Paruchuri, A. Durresi, Raj Jain