Sciweavers

790 search results - page 65 / 158
» Designated Confirmer Signatures
Sort
View
CONEXT
2010
ACM
13 years 8 months ago
Balancing throughput, robustness, and in-order delivery in P2P VoD
Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood--yet choo...
Bin Fan, David G. Andersen, Michael Kaminsky, Kons...
WWW
2005
ACM
14 years 10 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
LISA
2007
14 years 13 days ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
DAC
2005
ACM
14 years 11 months ago
Exploiting suspected redundancy without proving it
We present several improvements to general-purpose sequential redundancy removal. First, we propose using a robust variety of synergistic transformation and verification algorithm...
Hari Mony, Jason Baumgartner, Viresh Paruthi, Robe...
ICRA
2009
IEEE
148views Robotics» more  ICRA 2009»
14 years 4 months ago
Tracked vehicle with circular cross-section to realize sideways motion
—In this video, a novel tracked mechanism for sideways motion is presented. The tracked mechanism is of circular cross-section and has active rolling axes at the center of the ci...
Kenjiro Tadakuma, Riichiro Tadakuma, Keiji Nagatan...