Sciweavers

1087 search results - page 183 / 218
» Distributed Oblivious Transfer
Sort
View
MOBIMEDIA
2007
13 years 10 months ago
Adaptive link layer protocols for shared wireless links
— The error prone nature of wireless links often necessitates the use of a link layer protocol to ensure acceptable application performance. While traditional link layers assume ...
George Xylomenos, Michael Makidis
ICWS
2003
IEEE
13 years 10 months ago
Accelerated Information Sharing for Law Enforcement (AISLE) Using Web Services
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Bob Slaski, Gerry Coleman
WSC
1997
13 years 10 months ago
AutoMod Tutorial
The AutoModTM simulation system differs significantly from other systems because of its ability to deal with the physical elements of a system in physical (graphical) terms and th...
Matthew W. Rohrer
DIMVA
2009
13 years 10 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
ICMCS
2010
IEEE
169views Multimedia» more  ICMCS 2010»
13 years 10 months ago
Real-time stereo-vision system for 3D teleimmersive collaboration
Though the variety of desktop real time stereo vision systems has grown considerably in the past several years, few make any verifiable claims about the accuracy of the algorithms...
Ramanarayan Vasudevan, Zhong Zhou, Gregorij Kurill...