Sciweavers

404 search results - page 77 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
108
Voted
PAM
2010
Springer
15 years 4 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
94
Voted
LCTRTS
2009
Springer
15 years 4 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
MICCAI
2002
Springer
15 years 10 months ago
Standardized Analysis of Intracranial Aneurysms Using Digital Video Sequences
CT-angiography is a well established medical imaging technique for the detection, evaluation and therapy planning of intracranial aneurysms. Different 3D visualization algorithms s...
Sabine Iserhardt-Bauer, Peter Hastreiter, Bernd To...
ICDCS
2008
IEEE
15 years 3 months ago
DCAR: Distributed Coding-Aware Routing in Wireless Networks
—Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless ...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
P2P
2006
IEEE
122views Communications» more  P2P 2006»
15 years 3 months ago
2Fast : Collaborative Downloads in P2P Networks
P2P systems that rely on the voluntary contribution of bandwidth by the individual peers may suffer from freeriding. To address this problem, mechanisms enforcing fairness in band...
Pawel Garbacki, Alexandru Iosup, Dick H. J. Epema,...