Sciweavers

1737 search results - page 175 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ISPDC
2010
IEEE
15 years 3 months ago
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks
—In this paper, we propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wirele...
Ramon Novales, Neeraj Mittal, Kamil Saraç
DSN
2006
IEEE
15 years 11 months ago
Storage Allocation in Unreliable Peer-to-Peer Systems
Peer-to-peer systems provide the opportunity to pool large amounts of distributed resources to enable internetscale applications. However, the participant nodes are highly dynamic...
John A. Chandy
ATAL
2008
Springer
15 years 7 months ago
Dynamic Bayesian network based interest estimation for visual attentive presentation agents
In this paper, we report on an interactive system and the results ofa formal user study that was carried out with the aim of comparing two approaches to estimating users' int...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...
161
Voted
IBPRIA
2005
Springer
15 years 10 months ago
From Moving Edges to Moving Regions
In this paper, we propose a new method to extract moving objects from a video stream without any motion estimation. The objective is to obtain a method robust to noise, large motio...
Loic Biancardini, Eva Dokladalova, Serge Beucher, ...
NDSS
2002
IEEE
15 years 10 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...