Sciweavers

241 search results - page 40 / 49
» CACM: past, present, and future
Sort
View
NDSS
1998
IEEE
14 years 2 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
WETICE
1998
IEEE
14 years 2 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
ICCCN
1997
IEEE
14 years 2 months ago
Effective Search Strategies for Application-Independent Speedup in UDP Demultiplexing
We present UDP datagram demultiplexing techniques that can yield potentially substantial applicationindependent performance gains over BSD-derived UDP implementations. Our demulti...
Joseph T. Dixon, Kenneth L. Calvert
ICIP
2007
IEEE
14 years 1 months ago
Motion-Based Side-Information Generation for a Scalable Wyner-Ziv Video Coder
A motion-based side-information generation scheme with semi super-resolution for a scalable Wyner-Ziv coder framework is introduced. It is known that the performance of any Wyner-...
Bruno Macchiavello, Ricardo L. de Queiroz, Debargh...
CSWWS
2006
14 years 1 months ago
Fulfilling the Needs of a Metadata Creator and Analyst- An Investigation of RDF Browsing and Visualization Tools
The realization of Semantic Web vision is based on the creation and use of semantic web content which needs software tools both for semantic web developers and end users. Over the ...
Shah Kushro, A. Min Tjoa