Sciweavers

2169 search results - page 17 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
TELETRAFFIC
2007
Springer
15 years 5 months ago
Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques
Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. In a wavelength-routed optical network...
Alicia Nicki Washington, Harry G. Perros
CMS
2006
127views Communications» more  CMS 2006»
15 years 1 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
TIP
2010
107views more  TIP 2010»
14 years 6 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 6 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
RCIS
2010
14 years 9 months ago
Using Software Metrics in the Evaluation of a Conceptual Component Model
Every interactive system has a functional part and an interactive part. However the software engineering and the human-computer-interaction communities work separately in terms of ...
Eric Ceret, Sophie Dupuy-Chessa, Guillaume Godet-B...