Sciweavers

828 search results - page 50 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
114
Voted
AISS
2010
119views more  AISS 2010»
15 years 1 days ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
104
Voted
KI
2007
Springer
15 years 8 months ago
From Distributed Vision Networks to Human Behavior Interpretation
Abstract. Analysing human behavior is a key step in smart home applications. Many reasoning approaches utilize information of location and posture of the occupant in qualitative as...
Hamid K. Aghajan, Chen Wu
119
Voted
ICDCS
2009
IEEE
15 years 9 months ago
Stochastic Multicast with Network Coding
The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource ...
Ajay Gopinathan, Zongpeng Li
WSC
1998
15 years 3 months ago
A Speculation-based Approach for Performance and Dependability Analysis: A Case Study
In this paper, we propose two speculation-based methods for fast and accurate simulation-based performance and dependability analysis of complex systems, incorporating detailed si...
Yiqing Huang, Zbigniew Kalbarczyk, Ravishankar K. ...
ICS
2005
Tsinghua U.
15 years 8 months ago
Think globally, search locally
A key step in program optimization is the determination of optimal values for code optimization parameters such as cache tile sizes and loop unrolling factors. One approach, which...
Kamen Yotov, Keshav Pingali, Paul Stodghill