Sciweavers

1573 search results - page 223 / 315
» Strong User Authentication
Sort
View
VTC
2008
IEEE
112views Communications» more  VTC 2008»
15 years 8 months ago
Theoretical Analysis of Saturation Throughput in MU-DCF
Abstract—In this paper, the calculation of saturation throughput for previously proposed Multi-User - Distributed Coordination Function (MU-DCF) is presented. MU-DCF is an IEEE 8...
Jelena Mirkovic, Bernhard Walke
111
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Closed-Circuit Unobservable Voice over IP
Among all the security issues in Voice over IP (VoIP) communications, one of the most difficult to achieve is traffic analysis resistance. Indeed, classical approaches provide a...
Carlos Aguilar Melchor, Yves Deswarte, Julien Iguc...
COLCOM
2007
IEEE
15 years 8 months ago
Videoconferencing design for remote groups
—Videoconferencing has emerged as a popular method of remote communication. The design of a videoconferencing environment strongly influences the communication efficiency and u...
Petr Slovák, Eva Hladká, Pavel Troub...
104
Voted
GPC
2007
Springer
15 years 7 months ago
Towards Feasible and Effective Load Sharing in a Heterogeneous Computational Grid
A grid has to provide strong incentive for participating sites to join and stay in it. Participating sites are concerned with the performance improvement brought by the gird for th...
Kuo-Chan Huang, Po-Chi Shih, Yeh-Ching Chung
PKDD
2007
Springer
147views Data Mining» more  PKDD 2007»
15 years 7 months ago
MINI: Mining Informative Non-redundant Itemsets
Frequent itemset mining assists the data mining practitioner in searching for strongly associated items (and transactions) in large transaction databases. Since the number of frequ...
Arianna Gallo, Tijl De Bie, Nello Cristianini