Sciweavers

1583 search results - page 135 / 317
» The Quorum Deployment Problem
Sort
View
124
Voted
TIFS
2008
123views more  TIFS 2008»
15 years 3 months ago
Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust
Abstract--Digital single lens reflex cameras suffer from a wellknown sensor dust problem due to interchangeable lenses that they deploy. The dust particles that settle in front of ...
Ahmet Emir Dirik, Husrev T. Sencar, Nasir D. Memon
TITS
2008
133views more  TITS 2008»
15 years 3 months ago
Fuzzy Control Model Optimization for Behavior-Consistent Traffic Routing Under Information Provision
This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behaviorconsistent (BC) information-based control strategies to improve the...
Alexander Paz, Srinivas Peeta
117
Voted
CN
2004
115views more  CN 2004»
15 years 3 months ago
Bandwidth provisioning and pricing for networks with multiple classes of service
Network service providers purchase large point-to-point connections from network owners, then offer individual users network access at a price. Appropriately provisioning (purchas...
Errin W. Fulp, Douglas S. Reeves
CCR
2000
75views more  CCR 2000»
15 years 3 months ago
The Eifel algorithm: making TCP robust against spurious retransmissions
We propose an enhancement to TCP's error recovery scheme, which we call the Eifel algorithm. It eliminates the retransmission ambiguity, thereby solving the problems caused b...
Reiner Ludwig, Randy H. Katz
TC
1998
15 years 3 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine