Sciweavers

1286 search results - page 171 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
122
Voted
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 11 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
124
Voted
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 3 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
123
Voted
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 7 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
130
Voted
IMC
2006
ACM
15 years 8 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
134
Voted
CVPR
2000
IEEE
16 years 4 months ago
Real-Time Tracking of Non-Rigid Objects Using Mean Shift
A new method for real-time tracking of non-rigid objects seen from a moving camera is proposed. The central computational module is based on the mean shift iterations and nds the ...
Dorin Comaniciu, Visvanathan Ramesh, Peter Meer