Sciweavers

6907 search results - page 268 / 1382
» Securing distributed adaptation
Sort
View
ICDCS
2002
IEEE
15 years 9 months ago
An Extensible and Scalable Content Adaptation Pipeline Architecture to Support Heterogeneous Clients
The importance of middleware and content adaptation has previously been demonstrated for pervasive use of Web-based applications. In this paper we propose a modular, extensible, a...
Thomas Phan, George Zorpas, Rajive Bagrodia
CVPR
2012
IEEE
13 years 7 months ago
Robust visual domain adaptation with low-rank reconstruction
Visual domain adaptation addresses the problem of adapting the sample distribution of the source domain to the target domain, where the recognition task is intended but the data d...
I-Hong Jhuo, Dong Liu, D. T. Lee, Shih-Fu Chang
MIDDLEWARE
2007
Springer
15 years 10 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
160
Voted
HPDC
2003
IEEE
15 years 9 months ago
Security for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of ...
Von Welch, Frank Siebenlist, Ian T. Foster, John B...
ICNP
2003
IEEE
15 years 9 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...