Sciweavers

610 search results - page 106 / 122
» Predicate-Based Key Exchange
Sort
View
257
Voted
COMCOM
2000
105views more  COMCOM 2000»
15 years 2 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
102
Voted
COMCOM
2002
105views more  COMCOM 2002»
15 years 2 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
137
Voted
IJWIN
2002
154views more  IJWIN 2002»
15 years 2 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
130
Voted
TMM
2002
104views more  TMM 2002»
15 years 2 months ago
Spatial contextual classification and prediction models for mining geospatial data
Modeling spatial context (e.g., autocorrelation) is a key challenge in classification problems that arise in geospatial domains. Markov random fields (MRF) is a popular model for i...
Shashi Shekhar, Paul R. Schrater, Ranga Raju Vatsa...
132
Voted
JCB
2008
111views more  JCB 2008»
15 years 2 months ago
Sorting Genomes with Centromeres by Translocations
A centromere is a special region in the chromosome that plays a vital role during cell division. Every new chromosome created by a genome rearrangement event must have a centromer...
Michal Ozery-Flato, Ron Shamir