Sciweavers

5234 search results - page 800 / 1047
» Simulation of Computer Network Attacks
Sort
View
144
Voted
ICIP
2006
IEEE
16 years 6 months ago
Multi-Streaming of Visual Scenes with Scalable Partial Reliability
Three-dimensional (3D) visual scenes with pluralities of graphic objects require considerable network bandwidth to be transmitted and computing power to be rendered on a user'...
Ghassan Alregib, Dihong Tian
123
Voted
WWW
2009
ACM
16 years 5 months ago
Privacy preserving frequency capping in internet banner advertising
We describe an optimize-and-dispatch approach for delivering pay-per-impression advertisements in online advertising. The platform provider for an advertising network commits to s...
Ayman Farahat
137
Voted
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
16 years 4 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
PERCOM
2008
ACM
16 years 4 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
143
Voted
PERCOM
2006
ACM
16 years 4 months ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier