Sciweavers

24188 search results - page 4730 / 4838
» Computing on Encrypted Data
Sort
View
CCS
2004
ACM
15 years 10 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
ECUMN
2004
Springer
15 years 10 months ago
Fairness Property and TCP-Level Performance of Unified Scheduling Algorithm in HSDPA Networks
- Channel-state-aware scheduling strategies on wireless links play an essential role for enhancing throughput performance of elastic data traffic by exploiting channel fluctuatio...
Yoshiaki Ohta, Masato Tsuru, Yuji Oie
EWSN
2004
Springer
15 years 10 months ago
Networked Slepian-Wolf: Theory and Algorithms
Abstract. In this paper, we consider the minimization of a relevant energy consumption related cost function in the context of sensor networks where correlated sources are generate...
Razvan Cristescu, Baltasar Beferull-Lozano, Martin...
143
Voted
ICCS
2004
Springer
15 years 10 months ago
Complex Network of Earthquakes
Complex Network of Earthquakes Sumiyoshi Abe Institute of Physics, University of Tsukuba Ibaraki 3058571, Japan First, a brief discussion is made about a relevance of nonextensive...
Sumiyoshi Abe, Norikazu Suzuki
ISI
2004
Springer
15 years 10 months ago
SECRETS: A Secure Real-Time Multimedia Surveillance System
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
« Prev « First page 4730 / 4838 Last » Next »