Sciweavers

325 search results - page 54 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CISS
2007
IEEE
14 years 1 months ago
Routing Strategies in Broadband Multihop Cooperative Networks
— Two fundamental properties of wireless networks, the variable link quality and the broadcast nature of the transmission, have often been ignored in the design of routing protoc...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.
ICDAR
1999
IEEE
13 years 12 months ago
Multifont Classification using Typographical Attributes
This paper introduces a multifont classification scheme to help recognition of multifont and multisize characters. It uses typographical attributes such as ascenders, descenders a...
Min-Chul Jung, Yong-Chul Shin, Sargur N. Srihari
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
13 years 12 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
HPDC
2010
IEEE
13 years 8 months ago
Early observations on the performance of Windows Azure
A significant open issue in cloud computing is performance. Few, if any, cloud providers or technologies offer quantitative performance guarantees. Regardless of the potential adv...
Zach Hill, Jie Li, Ming Mao, Arkaitz Ruiz-Alvarez,...
OOPSLA
2010
Springer
13 years 6 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz