Sciweavers

1338 search results - page 216 / 268
» A Secure Communications Infrastructure for High-Performance ...
Sort
View
ISORC
2002
IEEE
14 years 1 months ago
Real-Time Resource Reservation for Synchronized Multimedia Object over Wireless LAN
The increasing use of wireless networks has necessitated the development of a wireless networking infrastructure that supports quality of service (QoS) for multimedia communicatio...
Husni Fahmi, Mudassir Latif, Basit Shafiq, Raymond...
PR
2010
129views more  PR 2010»
13 years 7 months ago
Parsimonious reduction of Gaussian mixture models with a variational-Bayes approach
Aggregating statistical representations of classes is an important task for current trends in scaling up learning and recognition, or for addressing them in distributed infrastruc...
Pierrick Bruneau, Marc Gelgon, Fabien Picarougne
CCS
2006
ACM
14 years 19 days ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
SAC
2005
ACM
14 years 2 months ago
Node clustering based on link delay in P2P networks
Peer-to-peer (P2P) has become an important computing model because of its adaptation, self-organization and autonomy etc. But efficient organization of the nodes in P2P networks i...
Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon,...
RAID
2010
Springer
13 years 7 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...