Sciweavers

981 search results - page 189 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
CN
2000
95views more  CN 2000»
13 years 7 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
ICIAP
2005
ACM
14 years 7 months ago
Asymmetric 3D/2D Processing: A Novel Approach for Face Recognition
Facial image analysis is very useful in many applications such as video compression, talking heads, or biometrics. During the last few years, many algorithms have been proposed in ...
Daniel Riccio, Jean-Luc Dugelay
MOBISYS
2007
ACM
14 years 7 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
SENSYS
2009
ACM
14 years 2 months ago
Optimal clock synchronization in networks
Having access to an accurate time is a vital building block in all networks; in wireless sensor networks even more so, because wireless media access or data fusion may depend on i...
Christoph Lenzen, Philipp Sommer, Roger Wattenhofe...