Sciweavers

972 search results - page 63 / 195
» presence 2007
Sort
View
ACSAC
2007
IEEE
15 years 6 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
ASAP
2007
IEEE
123views Hardware» more  ASAP 2007»
15 years 6 months ago
A memcpy Hardware Accelerator Solution for Non Cache-line Aligned Copies
In this paper, we present a hardware solution to perform non cache-line aligned memory copies allowing the commonly used memcpy function to cope with word copies. The main purpose...
Filipa Duarte, Stephan Wong
AVSS
2007
IEEE
15 years 6 months ago
Classifying and tracking multiple persons for proactive surveillance of mass transport systems
We describe a pedestrian classification and tracking system that is able to track and label multiple people in an outdoor environment such as a railway station. The features sele...
Suyu Kong, Conrad Sanderson, Brian C. Lovell
CISS
2007
IEEE
15 years 6 months ago
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
— The problem of detecting encrypted information flows using timing information is considered. An information flow consists of both information-carrying packets and irrelevant ...
Ting He, Lang Tong
CLUSTER
2007
IEEE
15 years 6 months ago
Scalable, fault-tolerant management of Grid Services
— The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large numb...
Harshawardhan Gadgil, Geoffrey Fox, Shrideep Palli...