Sciweavers

1522 search results - page 294 / 305
» Use of Devolved Controllers in Data Center Networks
Sort
View
TELSYS
2010
140views more  TELSYS 2010»
14 years 11 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
149
Voted
CSFW
2009
IEEE
15 years 11 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
ACMACE
2006
ACM
15 years 10 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
ICASSP
2010
IEEE
15 years 4 months ago
Automated ECG profiling and beat classification
ive CLP® ABSTRACT Ali A. Milani Broadband speech enhancement and active noise control nvironment ABSTRACT Vanishree Gopalakrishna Real-Time Implementation of Signal Processing Str...
Miad Faezipour, Adnan Saeed, Mehrdad Nourani
201
Voted
UIST
1993
ACM
15 years 8 months ago
VB2: An Architecture for Interaction in Synthetic Worlds
This paper describes the VB2 architecture for the construction of three-dimensional interactive applications. The system's state and behavior are uniformly represented as a n...
Enrico Gobbetti, Jean-Francis Balaguer, Daniel Tha...