Sciweavers

548 search results - page 57 / 110
» Secure peer sampling
Sort
View
DGCI
2003
Springer
15 years 5 months ago
Shape Preserving Digitization of Ideal and Blurred Binary Images
In order to make image analysis methods more reliable it is important to analyse to what extend shape information is preserved during image digitization. Most existing approaches t...
Ullrich Köthe, Peer Stelldinger
94
Voted
FIRSTMONDAY
2000
75views more  FIRSTMONDAY 2000»
15 years 11 days ago
Free Riding on Gnutella
An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. By sampling messages on the Gnutella network over a 24-hour period, we e...
Eytan Adar, Bernardo A. Huberman
WISTP
2010
Springer
15 years 7 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
102
Voted
CCS
2009
ACM
16 years 1 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
78
Voted
WISTP
2007
Springer
15 years 6 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette