Sciweavers

7300 search results - page 1362 / 1460
» Multi-modal network protocols
Sort
View
ANSS
2008
IEEE
15 years 11 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
123
Voted
ETFA
2008
IEEE
15 years 11 months ago
Segmentation of standard ethernet messages in the time-triggered ethernet
TT Ethernet is a communication architecture which allows the integration of the standard Ethernet traffic and real-time Ethernet traffic in the same network without invalidating...
Vaclav Mikolasek, Astrit Ademaj, Stanislav Racek
HASE
2008
IEEE
15 years 11 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
ICDCS
2008
IEEE
15 years 11 months ago
Weak vs. Self vs. Probabilistic Stabilization
Self-stabilization is a strong property which guarantees that a network always resume a correct behavior starting from an arbitrary initial state. Weaker guarantees have later bee...
Stéphane Devismes, Sébastien Tixeuil...
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
15 years 11 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
« Prev « First page 1362 / 1460 Last » Next »