Sciweavers

5451 search results - page 907 / 1091
» Typed Operational Semantics
Sort
View
ISW
2009
Springer
15 years 10 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
KIVS
2009
Springer
15 years 10 months ago
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems
Abstract. In peer-to-peer based live streaming systems, a great number of participants have to cooperate to efficiently and reliably distribute a continuous flow of data. Each rec...
Michael Brinkmeier, Mathias Fischer, Sascha Grau, ...
NOSSDAV
2009
Springer
15 years 10 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
NOSSDAV
2009
Springer
15 years 10 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda
SAMOS
2009
Springer
15 years 10 months ago
Experiences with Cell-BE and GPU for Tomography
Tomography is a powerful technique for three-dimensional imaging, that deals with image reconstruction from a series of projection images, acquired along a range of viewing directi...
Sander van der Maar, Kees Joost Batenburg, Jan Sij...