Sciweavers

3271 search results - page 605 / 655
» Controlled Multicast Framework
Sort
View
CACM
2005
126views more  CACM 2005»
15 years 2 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
JIPS
2007
223views more  JIPS 2007»
15 years 2 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
TWC
2008
154views more  TWC 2008»
15 years 2 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
CG
2004
Springer
15 years 2 months ago
3D video fragments: dynamic point samples for real-time free-viewpoint video
We present 3D video fragments, a dynamic point sample framework for real-time free-viewpoint video. By generalizing 2D video pixels towards 3D irregular point samples we combine t...
Stephan Würmlin, Edouard Lamboray, Markus H. ...
114
Voted
CN
2004
95views more  CN 2004»
15 years 2 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...