Sciweavers

1737 search results - page 134 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
156
Voted
MIR
2003
ACM
213views Multimedia» more  MIR 2003»
15 years 7 months ago
Replication algorithms to retrieve scalable streaming media over Content Delivery Networks
CDN (Content Delivery Networks) improves end-user performance by replicating web contents on a group of geographically distributed content servers. Replication Algorithm plays an ...
Zhou Su, Jiro Katto, Yasuhiko Yasuda
115
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
138
Voted
LICS
1999
IEEE
15 years 7 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
135
Voted
ATAL
2004
Springer
15 years 8 months ago
Merging Globally Rigid Formations of Mobile Autonomous Agents
This paper is concerned with merging globally rigid formations of mobile autonomous agents. A key element in all future multi-agent systems will be the role of sensor and communic...
Tolga Eren, Brian D. O. Anderson, Walter Whiteley,...
165
Voted
ICCV
2007
IEEE
15 years 4 months ago
COST: An Approach for Camera Selection and Multi-Object Inference Ordering in Dynamic Scenes
Development of multiple camera based vision systems for analysis of dynamic objects such as humans is challenging due to occlusions and similarity in the appearance of a person wi...
Abhinav Gupta, Anurag Mittal, Larry S. Davis