Sciweavers

9604 search results - page 1920 / 1921
» The Duality of TIme and Information
Sort
View
MOBIHOC
2007
ACM
15 years 9 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao
EUROSYS
2008
ACM
15 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
EUROSYS
2008
ACM
15 years 6 months ago
Towards cinematic internet video-on-demand
Video-on-demand (VoD) is increasingly popular with Internet users. It gives users greater choice and more control than live streaming or file downloading. Systems such as MSN Vid...
Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang
FIMH
2003
Springer
15 years 2 months ago
A Levelset Based Method for Segmenting the Heart in 3D+T Gated SPECT Images
Keywords Levelset methods were introduced in medical images segmentation by Malladi et al in 1995. In this paper, we propose several improvements of the original method to speed u...
Arnaud Charnoz, Diane Lingrand, Johan Montagnat
ACMSE
2008
ACM
14 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
« Prev « First page 1920 / 1921 Last » Next »