Sciweavers

1663 search results - page 69 / 333
» Computer Security in the Real World
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
End-to-End Quality of Service Management for Distributed Real-Time Embedded Applications
Many of the world’s most critical systems are distributed real-time embedded (DRE) systems, with missioncritical quality of service (QoS) requirements. However, because of their...
Prakash Manghwani, Joseph P. Loyall, Praveen Kaush...
SIGGRAPH
1999
ACM
14 years 1 months ago
Real-Time Acoustic Modeling for Distributed Virtual Environments
Realistic acoustic modeling is essential for spatializing sound in distributed virtual environments where multiple networked users move around and interact visually and aurally in...
Thomas A. Funkhouser, Patrick Min, Ingrid Carlbom
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 3 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
IFIPTM
2010
140views Management» more  IFIPTM 2010»
13 years 7 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay
WWW
2007
ACM
14 years 9 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi