Sciweavers

2354 search results - page 289 / 471
» DRM as a layered system
Sort
View
TON
2012
11 years 10 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
ICDCS
2012
IEEE
11 years 10 months ago
Combining Partial Redundancy and Checkpointing for HPC
Today’s largest High Performance Computing (HPC) systems exceed one Petaflops (1015 floating point operations per second) and exascale systems are projected within seven years...
James Elliott, Kishor Kharbas, David Fiala, Frank ...
HPDC
2012
IEEE
11 years 10 months ago
VNET/P: bridging the cloud and high performance computing through fast overlay networking
networking with a layer 2 abstraction provides a powerful model for virtualized wide-area distributed computing resources, including for high performance computing (HPC) on collec...
Lei Xia, Zheng Cui, John R. Lange, Yuan Tang, Pete...
ICRA
2007
IEEE
222views Robotics» more  ICRA 2007»
14 years 2 months ago
Autonomous Vision-based Landing and Terrain Mapping Using an MPC-controlled Unmanned Rotorcraft
In this paper, we present a vision-based terrain mapping and analysis system, and a model predictive control (MPC)based flight control system, for autonomous landing of a helicop...
Todd Templeton, David Hyunchul Shim, Christopher G...
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
14 years 1 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson