Sciweavers

849 search results - page 117 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
ICNP
1999
IEEE
14 years 1 months ago
WDM Multicasting in IP over WDM Networks
Supporting WDM multicasting in an IP over WDM network poses interesting problems because some WDM switches may be incapable of switching an incoming signal to more than one output...
Chunming Qiao, Myoungki Jeong, Amit Guha, Xijun Zh...
ESORICS
2007
Springer
14 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
CHI
2006
ACM
13 years 10 months ago
Shaping user input in speech graffiti: a first pass
Speech Graffiti is a standardized interaction protocol for spoken dialog systems designed to address some common difficulties with ASR. We have proposed a strategy of shaping to h...
Stefanie Tomko, Roni Rosenfeld
NCA
2005
IEEE
14 years 2 months ago
Slingshot: Time-Critical Multicast for Clustered Applications
Datacenters are complex environments consisting of thousands of failure-prone commodity components connected by fast, high-capacity interconnects. The software running on such dat...
Mahesh Balakrishnan, Stefan Pleisch, Ken Birman
ERCIMDL
1998
Springer
118views Education» more  ERCIMDL 1998»
14 years 1 months ago
E-Referencer: A Prototype Expert System Web Interface to Online Catalogs
Abstract. An expert system Web interface to online catalogs called EReferencer is being developed. An initial prototype has been implemented. The interface has a repertoire of init...
Christopher S. G. Khoo, Danny C. C. Poo, Teck-Kang...