Sciweavers

595 search results - page 12 / 119
» Survivability Analysis of Network Specifications
Sort
View
ICIP
2005
IEEE
16 years 1 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
GLOBECOM
2008
IEEE
14 years 12 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
COMCOM
2007
95views more  COMCOM 2007»
14 years 11 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
BMCBI
2008
108views more  BMCBI 2008»
14 years 11 months ago
New application of intelligent agents in sporadic amyotrophic lateral sclerosis identifies unexpected specific genetic backgroun
Background: Few genetic factors predisposing to the sporadic form of amyotrophic lateral sclerosis (ALS) have been identified, but the pathology itself seems to be a true multifac...
Silvana Penco, Massimo Buscema, Maria Cristina Pat...
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 11 months ago
A distributed file system for a wide-area high performance computing infrastructure
We describe our work in implementing a wide-area distributed file system for the NSF TeraGrid. The system, called XUFS, allows private distributed name spaces to be created for tr...
Edward Walker